Global Feed Post Login
Replying to Avatar jared

Yes, when you “hack” someone else’s server you are performing “unauthorized access”. Not so with a contract or protocol weakness that can be exploited by, say, submitting (malformed?) transactions to your own node, so you never did any unauthorized access. That’s the difference

Avatar
fiatjaf 2y ago

nostr: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

Reply to this note

Please Login to reply.

Discussion

No replies yet.