this post was submitted on 23 Aug 2023
134 points (99.3% liked)

Technology

37926 readers
327 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 6 years ago
MODERATORS
all 12 comments
sorted by: hot top controversial new old
[–] [email protected] 48 points 2 years ago (1 children)

What kind of public api has access to the full user list?

[–] [email protected] 15 points 2 years ago

This one ( ͡° ͜ʖ ͡°)

[–] [email protected] 31 points 2 years ago (1 children)

It’s the API that ALLOWED the misuse in the first place, so the developers are the ones to hold accountable.

[–] [email protected] 1 points 2 years ago

This is a tricky one. Are the developers themselves responsible or also managers and leadership? I don't have an answer to this.

[–] [email protected] 21 points 2 years ago* (last edited 2 years ago) (1 children)

I'd call this API misdesign instead

[–] [email protected] 16 points 2 years ago (1 children)

The worst is they paint it as "not a real leak" or "not a security issue" when it's even worse than that.

[–] [email protected] 4 points 2 years ago

No no no. It's a public API so it doesn't count!

[–] [email protected] 15 points 2 years ago

This isn't surprising, a user found out how to abuse the API to progress without doing lessons by just submitting the expected parameters last year. If they followed through on reporting to Duo then they've had plenty of time to address it. Seems like the mod also found out how vulnerable Duo was and took it to it's natural conclusion.

[–] [email protected] 6 points 2 years ago

Crap, I can't remember what email I used or what name was on it

[–] [email protected] 1 points 2 years ago

I used my spam email and my name on there is a meme so I'm not really worried.

[–] [email protected] -2 points 2 years ago

Well, I use a fake name and an email used only for Duolingo, so..... ok.