53

Comments

you are viewing a single comment's thread
view the rest of the comments
[-] WhyJiffie@sh.itjust.works 1 points 18 hours ago

That's usually how that works. You do a pen test and report vulnerabilities found and show a proof of concept of how you did it.

if the operator blocks you instead of giving a fuck, the consent for that cannot be obtained.

this post was submitted on 08 Sep 2025
53 points (100.0% liked)

Technology

540 readers
296 users here now

Share interesting Technology news and links.

Rules:

  1. No paywalled sites at all.
  2. News articles has to be recent, not older than 2 weeks (14 days).
  3. No external video links, only native(.mp4,...etc) links under 5 mins.
  4. Post only direct links.

To encourage more original sources and keep this space commercial free as much as I could, the following websites are Blacklisted:

More sites will be added to the blacklist as needed.

Encouraged:

Misc:

Relevant Communities:

founded 4 months ago
MODERATORS