Hacker News new | past | comments | ask | show | jobs | submit login

There is no reason to think, in this case, that it was a person they "didn't authenticate".



It's easy to think that, IMHO. Pre-arranging a challenge, recognizing by voice, performing a call-back to a widely publicized/trusted phone number... I really doubt anything like that occurred.

And even if there was authentication, now it's time for authorization. The only authorized recipient of a password is the exact same entity with which you established the password.


What do you think occurred?




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: