4.7 • 643 Ratings
🗓️ 13 February 2024
⏱️ 23 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | What's the best loophole that you've ever found? |
0:03.4 | I coach a high school team. |
0:05.1 | We recently bought airfare with Spirit Airlines to take nine students to a competition. |
0:09.4 | Two of the students cancelled about a month out from the trip, and we had to replace them with |
0:13.2 | two different students. |
0:14.8 | Spirit Airlines policy, no name changes. |
0:17.5 | Can't even pay a fee to change the name. |
0:19.8 | The tickets are basically lost. I have to buy new |
0:22.6 | tickets. Spirit's customer service is overseas, and they plainly don't care at all about customer |
0:27.1 | service, because they don't actually work for Spirit, etc., etc. Except that Spirits Airlines does |
0:33.3 | allow passengers to correct misspellings, and these folks don't really recognize nonsense names. |
0:38.7 | So over four calls, I changed the names of the cancelled students to the names of the new students, |
0:43.5 | two letters at a time. No one at Spirit Customer Service made a note, because who would care, |
0:48.1 | and no one ever notices that the correct names during the intermediate steps were nonsense. |
0:53.5 | Also, F.Spirit Airlines. |
0:56.9 | Some new magazine was asking college students to send out subscription forms by email to all their |
1:01.8 | friends. For each 25 emails you sent, you'd get a $10 Amazon gift card. Turns out they didn't |
1:07.8 | need to be real emails. I made about $100 before they told me to stop. |
1:12.9 | At my university, there was a command which you could use on their Unix systems to get a list of all the email addresses in the university, |
1:19.3 | which is why I guess my university email was always spammed. I wasn't hacking. They just didn't set up |
1:24.2 | user permissions properly. My justification as to why it's not hacking is that we had authorization to log into the system with our own user accounts, |
1:31.8 | and the command we used as a thoroughly documented, supported operating system command used with its intended purpose. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from youtube.com/@amithegenius, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of youtube.com/@amithegenius and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.