this post was submitted on 05 Jul 2024
731 points (99.2% liked)

Technology

55952 readers
3608 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] just_another_person@lemmy.world 174 points 1 week ago (41 children)

Yeah. They got data in a way that was not intended. That's a hack. It's not always about subverting something by clickity-clacking like in the movies.

[–] NateNate60@lemmy.world 1 points 1 week ago* (last edited 1 week ago) (4 children)
[–] kitnaht@lemmy.world 0 points 1 week ago* (last edited 1 week ago) (3 children)

Hint -- by manipulating or exploiting its code

Which I am explaining, they...did...not...do...

They did nothing to the code. They didn't break the code, they didn't cause the code to do anything it wasn't designed to do. They did not exploit any code. They used an API endpoint that was in the open. For its intended purpose, to verify phone numbers. The api verified phone numbers, they verified phone numbers with the api. The only thing they did here...was they did verification on a lot of phone numbers.

[–] lazynooblet@lazysoci.al 2 points 1 week ago

You're arguing with someone who was agreeing with you 😑

load more comments (2 replies)
load more comments (2 replies)
load more comments (38 replies)