34
Hacking the Call Records of Millions of Americans
(evanconnelly.github.io)
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
Community Rules
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
@obbeel
Major point of weakness is the human aspect.
Not any system, it's how you handle it as not 1 can be trusted.
No not even GNU Linux, you trust the gpg key or hash with shasum.
Look, even the dev of my distro state, it remain your decision to trust> an intern could be corrupt, something has been done wrong or is compromised on users end as well, that key may be tampered.
In social engineering we learned to not give any thing anything unless in a protected sense of that era called protection. And I hope you did just that .
@obbeel
parrotsec.org/docs/configuratiā¦