@kid
Proof remain, no system is safe.
One has never finished educating or improving to defend his castle and must always stay on edge and mostly adapt.
Maybe they didn't invest that much on security, as the article pointed out for not having a system that would uniquely identify only the number linked to the account.
@obbeel
Major point of weakness is the human aspect.
Not any system, it's how you handle it as not 1 can be trusted.
No not even GNU Linux, you trust the gpg key or hash with shasum.
Look, even the dev of my distro state, it remain your decision to trust> an intern could be corrupt, something has been done wrong or is compromised on users end as well, that key may be tampered.
In social engineering we learned to not give any thing anything unless in a protected sense of that era called protection. And I hope you did just that .
Oops
Cybersecurity
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world