Hacker News new | past | comments | ask | show | jobs | submit login

I'd think it's far more likely that GiveSendGo doesn't have the most sophisticated and well maintained tech stack and an exploit was easily found by hacktivists engaging in defacement and doxxing.



It was an open S3 bucket linked from the source code of the Freedom Convoy's donation page:

https://techcrunch.com/2022/02/08/ottawa-trucker-freedom-con...


The Tech Crunch article is much more informative.

Not only was this S3 public for reading but sounds like you could create & update as well since 2018. It contained "50 gigabytes of files, including passports and driver licenses".

Per the Tech Crunch article:

> It’s not known for exactly how long the bucket was left exposed, but a text file left behind by an unnamed security researcher, dated September 2018, warned that the bucket was “not properly configured” which can have “dangerous security implications.”


Let’s put it in the cloud, man. Everybody’s doing it!


An open S3 bucket is a huge red flag that this feels state manufactured. Most people aligned with this protest probably possess the technical chops to know to do better.


> An open S3 bucket is a huge red flag that this feels state manufactured.

I suspect both Occam and Hanlon would disagree.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: