Chapter
Clips
The speaker talks about the importance of finding and reporting vulnerabilities in companies' systems, and how it is essential to maintain an ethical approach towards it.
10:32 - 12:10 (01:38)
Summary
The speaker talks about the importance of finding and reporting vulnerabilities in companies' systems, and how it is essential to maintain an ethical approach towards it. He explains that while making fun or exploiting the vulnerability for any personal advantage can be harmful, helping the company and its users by reporting and fixing the issue is the right way to go.
ChapterBalancing public shaming and helping companies
EpisodeEp 49: Elliot
PodcastDarknet Diaries
The speaker discusses the idea that you can publicly shame a company for a mistake while still protecting user data, and that it's possible to do both.
12:10 - 13:50 (01:39)
Summary
The speaker discusses the idea that you can publicly shame a company for a mistake while still protecting user data, and that it's possible to do both. He also mentions that the company he exposed was grateful for the revelation and took steps to fix the issue.
ChapterBalancing public shaming and helping companies
EpisodeEp 49: Elliot
PodcastDarknet Diaries
Mimecast is a security solution that helps protect your email and workplace collaboration by detecting suspicious emails and providing another layer of protection for your inbox.
13:50 - 15:01 (01:10)
Summary
Mimecast is a security solution that helps protect your email and workplace collaboration by detecting suspicious emails and providing another layer of protection for your inbox.
ChapterBalancing public shaming and helping companies
EpisodeEp 49: Elliot
PodcastDarknet Diaries
The Adhar card is a form of identification that all Indian citizens carry, akin to a social security card in the US.
15:04 - 15:50 (00:45)
Summary
The Adhar card is a form of identification that all Indian citizens carry, akin to a social security card in the US. It has come under scrutiny lately after security weaknesses were discovered by a hacker.