Explanation

The pie chart shows the distribution of responses by other users to the example on the previous page. Mouse over the chart to see the total counts for each hat type.

This page also provides more specific details and background for the example.

Close

Hacker Hats

Survey Responses

Charlie Miller

Miller found a vulnerability in iOS which allowed a hacker to gain full control over an iPhone using a specially crafted text message.