Hacker News new | past | comments | ask | show | jobs | submit login

The question is not why this data exfiltration works.

But why do we think giving a random token sampler, we dug out through the haystack, special access rights, which seems to work most of the time, would always work?




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: