
Pet-nology
Hackable?
What Did You Find Before You Realize That You Shouldn't Stop Looking?
The way that the device is communicating with the cloud and asking for photos and gets the data back is by basically presenting itself as, ok, m device a b c, give me my photos. Since thereis no association between your email and the device, then anybody can ask for a b c data. And were you able to find addresses for devices that weren't your own? So yes, i found i found a lot. But since i had an indication if the device exists or not, somebody else could use that and get photos. The moment that i actually stopped looking into the device, because i felt like, ok, there's nothing else that i need out of it. It's
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.