The Hackers Who Tracked My Sleep Cycle (glama.ai)

by statements 8 comments 60 points
Read article View on HN

8 comments

[−] statements 50d ago
One thing I excluded from the article was that we intentionally disabled several checks (like hCaptcha) to let them get to the stage of setting up the payment intents. This is not something I've done before, but basically I wanted to see what happens if in future an attacker is able to bypass all IP/captcha/altcaptcha, etc. restrictions and gets to something that actually does damage. This allowed to see how they are trying to bypass various rate limits/checks that we added specifically for that step. Somewhat an isolated experiment.
[−] qmarchi 48d ago
I would wonder if this could also be used as a kind of tripwire, where legitimate users won't present CAPCHA tokens, etc. But fake connections will.
[−] LadyCailin 48d ago
I have no clue if this worked at all, but in college I made a site that had a checkbox that said “check this box if you’re human” and then hid it with bizarre CSS. If they checked the box, we errored out. I didn’t really do telemetry at all, so no clue if that worked at all, but yeah, I’ve had the same thought!
[−] cassonmars 48d ago
It's insane to me that Stripe cancels accounts when they get used for card testing. I get that it's because the onus would be on them otherwise, but the problem is that the onus is on anyone but the card companies in the first place.
[−] wolvoleo 47d ago
That's pretty creepy that they found you (well, the author, not sure if this was a self-submit) on discord though. Oof.
[−] KK7NIL 47d ago
Well, their Discord server is right on their front page, so he's pretty easy to find.
[−] wolvoleo 47d ago
Ah ok I didn't realise that. I only use discord for non work related stuff and never with my real identity. That makes sense though. I still view it as a gaming thing somehow.
[−] tenghuanhe 46d ago
interesting
[−] s5300 48d ago
[dead]