Thank you, Schooling, that is all good to know, and for me at least, to understand more about how hackers operate and DD works especially.
I get regular emails/primers on hacking techniques to look out for from my work (corporate) on a regular basis and have to do regular trainings and pass quizzes demonstrating I understand all the risks/baits and will avoid the attempts to compromise security of personal info, sign ins, networks, etc.
But I don't use Door Dash or understand how they manage their electronic data/communications/etc., so I really do appreciate your explanation that BK couldn't have used "any" knowledge he may have had to "hack into" DD, and what knowledge he may have had about "the cloud", ahem, forensically speaking, was probably paltry at best.
That said, I never meant to give him too much credit in any of my posts for being an expert in any way, shape, or form, just vetting possible implications of his knowledge that are out there making people think he is some sort of evil criminal/data hacking genius, which I do not ascribe to.
All MOO