33
top 6 comments
sorted by: hot top controversial new old
[-] opalfrost@friendica.world 5 points 3 days ago

@kid
Proof remain, no system is safe.
One has never finished educating or improving to defend his castle and must always stay on edge and mostly adapt.

[-] obbeel@lemmy.eco.br 2 points 3 days ago

Maybe they didn't invest that much on security, as the article pointed out for not having a system that would uniquely identify only the number linked to the account.

[-] opalfrost@friendica.world 1 points 3 days ago

@obbeel
Major point of weakness is the human aspect.
Not any system, it's how you handle it as not 1 can be trusted.
No not even GNU Linux, you trust the gpg key or hash with shasum.
Look, even the dev of my distro state, it remain your decision to trust> an intern could be corrupt, something has been done wrong or is compromised on users end as well, that key may be tampered.
In social engineering we learned to not give any thing anything unless in a protected sense of that era called protection. And I hope you did just that .

[-] opalfrost@friendica.world 4 points 3 days ago

@kid
wasn't this called before Phreaking?
But with modern methods as set api in Py script to OSINT.

[-] vk6flab@lemmy.radio 2 points 3 days ago
this post was submitted on 03 Apr 2025
33 points (100.0% liked)

Cybersecurity

6912 readers
31 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS