Ah! Your using Kanban then!
Nighed
Someone has a compiler if statement left somewhere in their code (... probably)
TIL about unbundled RECs. More questions to ask my companies sustainability team 😈
That's the routers business model though
It's probably a single dev that made the decision, then moves onto something else. They (probably?) don't have the ability to just raise a recurring PO etc to easily pay you and don't care enough to worth through the paperwork.
If you had a paid licencing model they may have done it, or just found another lib/ wrote their own.
they just send a OTP to your email with the idea that you should be keeping your email secure (and that email providers are more secure than they can be)
The whole site seems like a PoC - the accounts don't even have passwords! (I could actually kinda get on board with this)
The main thing to look for with motherboards (other than CPU compatibility) is the ports it has. Number/type of usb ports, ethernet speed etc. that's most likely to be the thing that annoys you if you buy the wrong one.
(PCIE expansion cards can fix most problems there though if needed)
You can probably get the URL for a companies SharePoint pretty easily, but you need a login. You are able to get a PAs credentials through a phishing link etc but need the 2fa code.
You do the IT phishing attack (enter this code for me to fix your laptop being slow...), get them to enter the code and now you have access to a SharePoint instance full of confidential docs etc.
I'm not saying it's a great attack vector, but it's not that different to a standard phishing attack.
You could attack anything that's using the single sign on. Attack their build infrastructure and you now have a supply chain attack against all of their customers etc.
It helps but its not enough to counter the limits of human gullibility.
It requires the bad guy to go to the page and ask the user to enter the code the bad guy gets
The difficult bit is getting all of the utilities in there in a maintainable way I believe