2min chapter

Security Conversations cover image

Charlie Miller on hacking iPhones, Macbooks, Jeep and Self-Driving Cars

Security Conversations

CHAPTER

The Legitimate Vulnerability Market

"I was in basically the same area as Dave Itelsey. And both of you will have the same answer, which is I can't tell you anything about it," he says. "That stuff is so outdated. Anything I worked on is 20 years old, so no one cares anyway." The NSA has been a target for cyber-espionage since 9/11.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode