What about people who only have one device? Kids, elderly, people with only work computer.
What about people who only have one device? Kids, elderly, people with only work computer.
Simply paying is not sufficient. You need to be a telecom company, or a researcher afaik.
In what world would the US gov care to get into your bank account? Or your Facebook account when it’s already tightly controlled?
Proton is already used for identity management: OTP via email. They’ll implement OAuth if there’s enough demand for it. A company’s purpose is to be profitable, ethics side is largely irrelevant.
Many countries already have digital government ID: Australia, Estonia, Russia.
Watch the video again to see how hard it was for Derrick to get access. He got it via his telecom/academia researcher contact.
S7 will be retired or extended with access control. TOTP apps don’t work for edge cases like broken phone. Dedicated token devices get lost. SMS will continue being the main solution for 2FA.
Not true. SMS is encrypted in 3G, LTE, 5G. Block cyphers like Kasumi and A/9 are used. SMS is reasonably secure, because it’s hard to infiltrate telecom systems like S7
It’s so much easier to quit social media when you’re on meth.
Because writing web apps is boring as fuck, and evaluating switching provides a reason to stop coding in PHP, and write an article about how they still need to write PHP.
Is it more effective than feeding them via TikTok, Twitter, Instagram?
Let me guess, you signed an NDA, and won’t tell anyone which brands had badly configured access control in their web apps?
Each red flag is okay, but all together is rather strange. It’s kinda classic to say that pajeets write shitty code.
Notice a few red flags. 1) they were contacted before the system was rolled out. Before anyone else could look for bugs 2) it is reported by techcrunch and is trending tech news 3) the exploits are rudimentary 90s era mistakes that even LLMs don’t make these days
So it’s likely that they paid McDonald’s India to pretend to have horrible practices. $240 is another tactic to appear good and trustworthy. That brings traffic to their blue team company site, effective advertising. Standard fakery that security faggots utilize to spread the FUD to create demand for their services.
Broke back convolution
Good, because it’s not of interest.
Even better for your career is being an actual researcher with a good grasp on heap grooming, MAC circumvention instead of spreading FUD over something that can easily be detected with burp.