Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That also explains why Apple could exclude abuse happening in the logs, which some commenters have refuted.

If they have all the JWTs, seeing if one had a different e-mail than the logged-in user should be fairly doable.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: