this post was submitted on 05 Jul 2024
733 points (99.1% liked)

Technology

59589 readers
2891 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] just_another_person@lemmy.world 176 points 4 months ago (41 children)

Yeah. They got data in a way that was not intended. That's a hack. It's not always about subverting something by clickity-clacking like in the movies.

[–] NateNate60@lemmy.world 1 points 4 months ago* (last edited 4 months ago) (4 children)
[–] kitnaht@lemmy.world 0 points 4 months ago* (last edited 4 months ago) (3 children)

Hint -- by manipulating or exploiting its code

Which I am explaining, they...did...not...do...

They did nothing to the code. They didn't break the code, they didn't cause the code to do anything it wasn't designed to do. They did not exploit any code. They used an API endpoint that was in the open. For its intended purpose, to verify phone numbers. The api verified phone numbers, they verified phone numbers with the api. The only thing they did here...was they did verification on a lot of phone numbers.

[–] lazynooblet@lazysoci.al 2 points 4 months ago

You're arguing with someone who was agreeing with you 😑

load more comments (2 replies)
load more comments (2 replies)
load more comments (38 replies)