| ▲ | upheaval7276 16 hours ago | |||||||||||||||||||||||||
we don't even know how it was compromised. was his password "password", or did the hackers exploit a gmail/google vulnerability? | ||||||||||||||||||||||||||
| ▲ | weaksauce 15 hours ago | parent | next [-] | |||||||||||||||||||||||||
i think the facts of the matter are that a gmail vulnerability is on the very low likelihood kind of event. they wouldn't burn their insanely valuable vulnerability on showing how much of a fratboy kash is. the most likely possibility is that he either clicked on something dumb and gave access through phishing(really bad) or had a really weak password without 2fa(also really bad). | ||||||||||||||||||||||||||
| ▲ | pkilgore 16 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
are you suggesting the former is not a demonstration of a shocking lack of competency? | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | drfloyd51 15 hours ago | parent | prev [-] | |||||||||||||||||||||||||
Did the director have his email on a vulnerable server? Yes. Yes he did. He should have known better. | ||||||||||||||||||||||||||