Source for the screenshot: https://heavy.com/news/dan-kaminsky-cause-of-death/
So apparently this Dan Kaminsky isnt just a random nobody. He was a fairly well known computer security expert:
Dan Kaminsky was an American security researcher. He was a co-founder and chief scientist of White Ops, a firm specializing in detecting malware activity via JavaScript.
He is known among computer security experts for his work on DNS cache poisoning, for showing that the Sony Rootkit had infected at least 568,000 computers,and for his talks at the Black Hat Briefings.
In July 2008 Kaminsky discovered a fundamental flaw in the Domain Name System (DNS) protocol. The flaw could allow attackers to easily perform cache poisoning attacks on most nameservers. With most Internet-based applications depending on DNS to locate their peers, a wide range of attacks became feasible, including web site impersonation, email interception, and authentication bypass via the "Forgot My Password".
Kaminsky worked with DNS vendors in secret to develop a patch to make exploiting the vulnerability more difficult, releasing it on July 8, 2008. The DNS design flaw vulnerability has not been fully fixed.
Kaminsky had intended not to publicize details of the attack until 30 days after the release of the patch, but details were leaked on July 21, 2008
So apparently Dan Kaminsky isnt just a random nobody. He was a fairly well known computer security expert:
Dan Kaminsky was an American security researcher. He was a co-founder and chief scientist of White Ops, a firm specializing in detecting malware activity via JavaScript.
He is known among computer security experts for his work on DNS cache poisoning, for showing that the Sony Rootkit had infected at least 568,000 computers,and for his talks at the Black Hat Briefings.
In July 2008 Kaminsky discovered a fundamental flaw in the Domain Name System (DNS) protocol. The flaw could allow attackers to easily perform cache poisoning attacks on most nameservers. With most Internet-based applications depending on DNS to locate their peers, a wide range of attacks became feasible, including web site impersonation, email interception, and authentication bypass via the "Forgot My Password".
Kaminsky worked with DNS vendors in secret to develop a patch to make exploiting the vulnerability more difficult, releasing it on July 8, 2008. The DNS design flaw vulnerability has not been fully fixed.
Kaminsky had intended not to publicize details of the attack until 30 days after the release of the patch, but details were leaked on July 21, 2008