![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/c47230a8-134c-4dc9-89e8-75c6ea875d36.png)
Where have I heard this one before?
Where have I heard this one before?
I really wish there was a way to kick countries out of the EU.
The scenario you described would not be breaking in.
Terms and conditions being agreed to are not relevant for this purpose. An exposed API is one that is welcome to be exploited. If you’re not requiring an API key, you’re essentially saying “This API is free for anyone to use” for security purposes, regardless of what you say in the terms and conditions.
Of course it’s stealing. But they didn’t break in.
Hacking = breaking in
Data breach = stealing stuff
I’m not talking out of my arse here either. I don’t work in security specifically but I’ve got a CS degree as well and it contradicts my understanding of how those terms are generally used. This is an open API endpoint, equivalent to leaving the garage door open.
But the distinction is usually unimportant. A security hole is a security hole regardless of what you call it.
I’m not someone who works on the practical side of security, but as a computer scientist, I do not agree that it is “hacking”. That contradicts my understanding of “hack” versus other types of exploits, but you are correct that the distinction is generally not that important. A security problem is a security problem regardless what it’s called
It is a vulnerability, but exploiting that vulnerability is not generally considered by security experts to be “hacking” in the usual meaning of that term in academic settings. Using an open or exposed API, even one with a sign that says “don’t abuse me”, is generally not considered hacking.
Please provide a link to whatever source claims this.
I hold a computer science degree and this contradicts the definition of “hack” versus “exploit” used in academic settings.
They did not do it by manipulating code. This wasn’t the result of a code vulnerability. If you leave the door wide open with all your stuff out for the entire neighbourhood to see, you can’t claim you were “broken into”. Similarly, if you don’t secure your endpoints, you can’t claim you were “hacked”.
With due respect, you are wrong.
hack
…
- (transitive, slang, computing) To hack into; to gain unauthorized access to (a computer system, e.g., a website, or network) by manipulating code
Hacking means gaining unauthorized access to a computer system by manipulating or exploiting its code.
You are correct, I replied to the wrong comment
Questionable news plus four paragraphs of highly partisan commentary
Even Reddit news is superior, and that place is a shit hole
The junta will be in deep shit if or when the National Unity Government decides to issue its own currency to compete with the junta-issued Burmese kyat. Especially if that currency is backed with USD or some other hard currency or resources.
English-speaking Africans: guess I’ll die
Well, that apparently means the government that did that doesn’t agree with me.
Registration of prohibited car models is not allowed. You might be able to import them, but there might be punitively high tariff and it would not be legal to drive
The competition is welcome. We need it to continue to drive innovation. At least in America, traditional American brands haven’t put out anything interesting for years. Just the same models being rehashed, but slightly bigger and more fuel efficient.
Yeah, what’s wrong with GNOME’s calendar? It’s basic and it works… fine. I use it for my daily tasks.
Window’s default calendar is similarly mediocre.
Then you can get permanent access for 165 USD (one-off payment)