So i wrote this on the other site (the short messages wannabe porn site) and predictably got just a single response.
Perhaps here I would fare better?

Reading the Qualys writeup about the OpenSSH race condition RCE it occurred to me that there should be a book titled "Beautiful Exploits" in which a handful of beautiful exploits are explained and their philosophical and historical implications are discussed.

Which ones you'd pick?

@4Dgifts Perhaps a less traditional pick, but the bypass of copy protections on music CDs using a black marker.

It’s a beautiful example of the challenges of securing something when the owner has physical access, fair use ethics, understanding storage layout, and creative manipulation.

https://hydrogenaud.io/index.php/topic,1731.0.html

Bypass audio CD protections with a felt tip pen or a Post-It

Bypass audio CD protections with a felt tip pen or a Post-It

@Oobleck @4Dgifts And on the PS1 you could bypass copy protection by doing some sort of disc swap.