View Single Post
Old 06-16-2010, 02:16 PM   #21
Krystian Galaj
Guru
Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.Krystian Galaj can tame squirrels without the assistance of a chair or a whip.
 
Posts: 820
Karma: 11012
Join Date: Nov 2007
Location: Warsaw, Poland
Device: Bookeen Cybook
Quote:
Originally Posted by Shaggy View Post
The reports are suggesting that Goatse obtained the email addresses, is that not correct?

There's a difference between discovering a vulnerability and notifying the company, versus actually making use of that vulnerability to download data. Or are the media reports wrong (wouldn't surprise me) and they never did the second part?
Well, obviously. To prove something is a vulnerability one needs to show that such things can be obtained. As you undoubtedly read in the article:
Quote:
We disclosed only to a single journalist and destroyed the data afterward.
What less could they do to prove to the world the vulnerability exists, when the company ignored the notice?
Krystian Galaj is offline   Reply With Quote