Hacker News new | past | comments | ask | show | jobs | submit login

Can we get a better understanding of the root cause and blast radius?

You say, "if someone had conversation trimming on, it could create a rare situation where a database ID was re-used in a way that could result in this behavior."

Is this someone user A or user B? Where is this database and what is it storing? Are these images previously sent or received from either A or B, or are they possibly from some thread between users C and D? How does this agree with end-to-end encryption?

How can you expect people to use your product with a bug this severe and no analysis of the impact or a statement as to who might have been affected?




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: