I spend a lot of time reverse engineering well-known applications to uncover vulnerabilities, which I then report and assist in fixing.
I was able to do this three years ago using GetTaxi, a well-known application that functions similarly to Uber but is connected to actual taxi firms and operates in London, Russia, and a few other locations.
GetTaxi handled the vulnerability like the professional that they are by responding very well.
Anyhow, three years later, I made the decision to post the white paper I created to reveal the vulnerability because it includes the full logical process used to find the exploit.
I must tell you that the exploit is no longer valid.
The fantastic GetTaxi crew learned about it and corrected it.
I must tell you that the exploit is no longer valid.
The fantastic GetTaxi crew learned about it and corrected it.
I was able to do this three years ago using GetTaxi, a well-known application that functions similarly to Uber but is connected to actual taxi firms and operates in London, Russia, and a few other locations.
GetTaxi handled the vulnerability like the professional that they are by responding very well.
Anyhow, three years later, I made the decision to post the white paper I created to reveal the vulnerability because it includes the full logical process used to find the exploit.
I must tell you that the exploit is no longer valid.
The fantastic GetTaxi crew learned about it and corrected it.
I must tell you that the exploit is no longer valid.
The fantastic GetTaxi crew learned about it and corrected it.