• freagle@lemmygrad.ml
    ·
    6 hours ago

    Yes, they are mapping human networks because humans are the weakest link in any security. Once you know who's talking with whom, when, where, and how frequently, you can essentially get anything you need by finding the weakest links and exploiting them.

    • urmums401k [she/her, they/them]
      ·
      1 hour ago

      There's an old exercise that shows you dont even have to exploit them. Just knowing the metadata can tell you a loooot.