| ▲ | why_only_15 5 hours ago | |
if your bucket name is ever exposed and you later delete it, then this doesn't help you. | ||
| ▲ | lijok 4 hours ago | parent [-] | |
The entire article talks about “guessing” the bucket name as being the attack enabler, not the leaking of it. What does the landscape look like once you start doing the basics like hashing your bucket names? Is this still a problem worth engineering for? | ||