Eh. Maybe spamming. I don't think this is hacking though. What vulnerability did they exploit to manipulate data?
Login to reply
Replies (1)
There's no need to exploit a vulnerability in order to hack.
Finding new creative ways to use a tech and achieving a desired new result is hacking.
🫂