logoalt Hacker News

lijokyesterday at 10:35 AM0 repliesview on HN

The entire article talks about “guessing” the bucket name as being the attack enabler, not the leaking of it. What does the landscape look like once you start doing the basics like hashing your bucket names? Is this still a problem worth engineering for?