TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Anatomy of a hack

22 点作者 gr2020大约 10 年前

1 comment

rilita大约 10 年前
Summary of process:<p>1. Used mail.com, which was apparently vulnerable to some hack that allows resetting the password for accounts.<p>2. Hacker was able to setup call forwarding for the person&#x27;s phone, with only the email address to prove identity ( and perhaps information taken from emails )<p>3. Hacker was then able to reset gmail account even with two-factor auth, by having the two-factor number read out via voice via call forwarding.<p>Email is pretty much the problem here entirely. Using an insecure email host, and having access to your email be able to access thousands of dollars worth of bitcoins... is terrible.<p>Do you trust email hosts in general? I certainly don&#x27;t.
评论 #9166887 未加载