this post was submitted on 31 Aug 2025
82 points (100.0% liked)
Privacy
3424 readers
182 users here now
Icon base by Lorc under CC BY 3.0 with modifications to add a gradient
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You should look at the original post from the security researcher. He used an employees login to access internal MCD software, defaced stuff for a short time, etc.
Of course MCD didn’t take that well.
Good on him.