• WhyJiffie@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    5 days ago

    No testing. No verification. No evidence.

    what do you mean? that Micah should have tested the vulnerability, by hacking the server? that’s heavily illegal.

    • CmdrShepard49@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      4 days ago

      Defamation is also illegal, so what’s your point? That didn’t stop him from making claims about ICEBlock without any actual proof in his rush to disparage this guy and his app as people do when they have an axe to grind. He clearly “handled it in the worst possible way.”

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        4 days ago

        Defamation is also illegal, so what’s your point?

        if the iceblock dev weren’t such a douchebag, they wouldn’t be defamed. It’s not good if they didn’t update security critical software, but what’s much worse is how the dev handled it.

        • CmdrShepard49@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          4 days ago

          In what way is the dev a douchebag? He blocked some self-important troll who has an axe to grind against him. You literally have no idea whether his Apache needs to be updated or not or whether there are any vulnerabilities in his app.

          You clearly also have an axe to grind here which is why you have nothing of substance to say and instead rely solely on unfounded accusations and name calling as an argument.

    • Orygin@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 days ago

      That’s usually how that works. You do a pen test and report vulnerabilities found and show a proof of concept of how you did it.
      Just checking the version of Apache means absolutely nothing here and any security check that only does that is useless.

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 days ago

        That’s usually how that works. You do a pen test and report vulnerabilities found and show a proof of concept of how you did it.

        if the operator blocks you instead of giving a fuck, the consent for that cannot be obtained.