this post was submitted on 31 Aug 2025
80 points (100.0% liked)
Privacy
2706 readers
393 users here now
Icon base by Lorc under CC BY 3.0 with modifications to add a gradient
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You should look at the original post from the security researcher. He used an employees login to access internal MCD software, defaced stuff for a short time, etc.
Of course MCD didn’t take that well.
Good on him.