And to the band in Buffy the Vampire Slayer. Both of which reference the original case, which became a meme because the woman’s claim was seen as so unbelievable.
And then nearly a decade later it was found that she was telling the truth.
As a side note I must confess a certain degree of uneasiness reading some of the borderline-toxic comments, which - to be fair - are nothing new.
This time around though it seems there's a certain obvious difficulty in certain commenters to contextualize what's being shown here.
I understand that "oh but that could be an app/website/whatever" or that "it's an US phone number, I ain't gonna use that" or "ahhhh, this is gonna be abused soooo bad" and so on and so forth... but folks: this clearly is meant to be something quirky and - I think - a v1.
Have we perhaps become a bit of a boring grumpy bunch around here? My 2c.
Not quite the same thing but I have meetings when I roll out a new feature that are “No suggestions” meetings.
We still allow for enhancements / added features that in other ways, but some meetings are for learning, not the peanut gallery peppering people with ideas that occurred to them in the last 20 seconds and that believe it or not we know…
We get it out and in customers hands and it is like magic how all these ideas sometimes prove to not be 100% necessary on day 1 … sometimes never.
> Currently, we only have a US based phone number that can be used to interact with our service. We understand that this can be expensive in some countries, so we will be working on a WhatsApp integration for the future.
> Among other things, the vault gave access to a shared cloud-storage environment that contained the encryption keys for customer vault backups stored in Amazon S3 buckets.
Wow. So those backups - which I hope and assume are encrypted with users’ credentials and were supposed to have one more layer of “LastPass” corp encryption - now seem to be lacking the latter. This sounds equivalent to stealing the encrypted blobs from each and every LP user.
(Hoping to be wrong here)
If one workstation getting hacked led to something like this I wonder what other mess is hiding in the crypto details…