@kid
Proof remain, no system is safe.
One has never finished educating or improving to defend his castle and must always stay on edge and mostly adapt.Maybe they didn’t invest that much on security, as the article pointed out for not having a system that would uniquely identify only the number linked to the account.
@obbeel
Major point of weakness is the human aspect.
Not any system, it’s how you handle it as not 1 can be trusted.
No not even GNU Linux, you trust the gpg key or hash with shasum.
Look, even the dev of my distro state, it remain your decision to trust> an intern could be corrupt, something has been done wrong or is compromised on users end as well, that key may be tampered.
In social engineering we learned to not give any thing anything unless in a protected sense of that era called protection. And I hope you did just that .
@kid
wasn’t this called before Phreaking?
But with modern methods as set api in Py script to OSINT.Oops