• sbv@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 days ago

    The app now needs to validate the response from the back end. If the attacker can bypass the purchase check, what prevents the attacker from bypassing the response from the back end?