@egypt @HalvarFlake @kwanre @saper yes in that context I fully agree with you. I've written a lot of Linux kernel bugs before I understood anything about the Linux kernel.
I'm talking here about systemic issues that are harder to find unless you understand the relationships between technologies and their security models.
@HalvarFlake @kwanre @saper did you read my recent blog post on the RISC-V MCM flaws?
A point I made in that piece is that exploit engineering (in the context of complex exploit dev) requires a thousand-foot view of an entire technology to succeed, while engineers are often cordoned off to specific subsets of technologies.
Complementary skills, but very different perspectives.
On Princeton's discovery of security-impacting flaws in #RISC-V MCM: Don't rely on Linus' Law to secure CPU architectures!
http://blog.securitymouse.com/2017/04/the-risc-v-files-princeton-mcm-and.html
@HalvarFlake @kwanre in the past few years I decided to go back and re-write my exploits once they are "good enough" because I want them to be more clean/accurate/readable, not just for others, but for myself.
I'll never forget the emails from a leaked email spool around ~2002 when the US Army said one of jduck's exploits was "the cleanest we had ever seen". And it was. ;-)