Hacker News new | past | comments | ask | show | jobs | submit login

Beeper is not exploiting any kind of vulnerability. The user is voluntarily providing their Apple ID credentials (or doing the SMS verification process to prove ownership of their number), just like they would on an iPhone.



Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: