▲ | oefrha 4 days ago | |
Note: The parent comment accused me of giving clues to hack the application, but that part was later edited out, making my response a bit strange. --- This is basically a free security audit, even though I only spent like five minutes. If your application can be "hacked" so easily, it's very irresponsible to say you're "verifying" the conjecture. Removing the comment doesn't make your application any more secure. Btw, I even helpfully pointed to prior art which you can learn from. A butthurt response is pretty sad. | ||
▲ | jay_gridbach 4 days ago | parent [-] | |
At this point, I am not capable with addressing the thing you pointed out. I didn't want to make the system closed-network nor login required. Technically, I think it is impossible to prevent reporting fake result as long as it is open network system - which means my design doesn't fit to seeking rigor. I hope this comment answers to your question. I will continue my project to seek meaningful purpose in some extent. |