1) The document discusses various web browser exploits discovered by the author, including ones that bypass security features like ASLR, DEP, and sandboxing. 2) Examples of exploits discussed include ones that use JavaScript obfuscation, SMB protocol vulnerabilities in VLC media player, and memory corruption bugs. 3) The author argues that fundamental changes are needed to web application delivery and security models to fully address the ongoing issues, including changes to HTML, HTTP, and how browsers isolate content.