Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

As I read it, he didn't use the credentials to take the source code; he found the credentials in the source code. He used the credentials merely to verify the credentials were valid.


Ahh, at the time I thought err4nt was referring to the public posted login credentials and was making the analogy off of that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: