• JackbyDev@programming.dev
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    15 days ago

    Hack has at least two definitions in a computing context.

    1. A nifty trick or shortcut that is useful. “Check out this hack to increase your productivity.”
    2. Accessing something you shouldn’t. “They hacked into the database.”

    A lot of times they sort of get used in conjunction to describe interesting ways to gain access to secure systems, but using it to describe accessing insecure things you shouldn’t is still a valid usage of the phrase.

    That said I definitely wanna see the company face charges for this, this is insane.

    • Spice Hoarder@lemmy.zip
      link
      fedilink
      arrow-up
      1
      ·
      15 days ago

      No, this was a data leak. The word “hack” has legal implications and shifts the blame away from the company and onto the individual who discovered the leak.

    • SpaceCowboy@lemmy.ca
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      15 days ago

      Yeah, if I leave my house door wide open for a few weeks and I get robbed, it’s still burglary.

      • Rivalarrival@lemmy.today
        link
        fedilink
        English
        arrow-up
        2
        ·
        14 days ago

        Terrible analogy. A webserver is not at all like a door. It doesn’t block or allow traffic to and from your file system.

        A web server is more like a receptionist. It handles requests. “Can I have your basic catalog?” “Certainly, here you go.”

        “Can I get this item from your basic catalog?” “Certainly.”

        “I don’t see it in your catalog, but my buddy said he got this other item from you. Can I have this other item too?” “Absolutely.”

        “Can I borrow your stapler?” Sure. “How about a pad of paper?” “Of Course”. “Can I just have the contents of your supply closet?” “Here you go.” “How about your accounting files, can I get those?” “No problem!” “How about your entire customer list?” “Consider it done!”

        When you hire a receptionist and specifically tell them to give customers anything they request, that’s entirely on you. You have to at least make a token effort to restrict access to only authorized users before you can even claim that a particular user was unauthorized.

        This wasn’t burglary. This was putting up signs that say “come in” and labeling everything in your house with “free” stickers.