• stephen01king@lemmy.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 months ago

    But by the guy’s definition, they also used a loophole to extract sensitive information, so it it also an exploit.