Bruteforcing the phone number of any Google user

Legacy systems, deprecation, and security architecture

  • Several comments highlight how large companies accumulate fragile legacy flows (like Google’s no-JS recovery page) that are hard to test and maintain, especially across many products and UIs spanning decades.
  • There’s debate over whether Google’s massive revenue means they “should just fix it”:
    • One side says they lack incentive because end users aren’t the real customers; advertisers and enterprise buyers are.
    • Others stress that money alone doesn’t solve it: “unsexy” maintenance work is hard to staff, hard to pay differently for, and often needs high-level attention to reorganize properly.
  • Some argue that aggressive product deprecation is security-driven: every extra surface is another future exploit. Others counter that if a product’s mere existence threatens account security, the shared-account architecture is flawed (too much power in central identity/contacts services).

Bug bounties, incentives, and “likelihood low”

  • Many commenters think the ~$5k / $1,337 awards are insultingly low for a vulnerability that can leak phone numbers at Google scale and potentially aid serious attacks.
  • Concern: underpaying pushes talented researchers toward less ethical buyers.
  • Counterpoint: bug bounties are not realistically competing with nation-state or criminal markets; the value is in mobilizing many ethical researchers cheaply, despite triage overhead.

Phone numbers, privacy, and SIM-swap risk

  • Strong disagreement over how “private” a phone number is:
    • Some say it’s already widely exposed via breaches, data brokers, and historic phone books; treat it like a name.
    • Others emphasize modern consequences: SIM swaps, SMS 2FA, and easy social engineering make number exposure materially dangerous.
  • Several recommend never tying real numbers to major accounts, or using burner/relay numbers, though practical constraints (forced verification, carrier rules) complicate this.

Cross-service hints and data aggregation

  • Commenters are alarmed that partial phone/email/card hints from many services can be combined to fully reconstruct identifiers. Past real-world cases (e.g., chained Apple/Amazon flows) are cited as precedent.
  • Telegram bots, data brokers, and automated services already aggregate such fragments.

IPv6 and rate limiting

  • The exploit’s use of many IPv6 addresses spurs discussion that per-IP limits are obsolete:
    • Common suggestion: rate limit by /64 block at least, since many providers hand out /64s or bigger.
    • Others note this can unfairly impact shared networks (universities, large LANs) and that with residential /56/48 delegations, effective abuse detection must consider ASN and allocation patterns.