• @disguy_ovahea
    link
    5
    edit-2
    6 months ago

    Like “hacking.” The vast majority of breaches are accomplished by password acquisition or social engineering. Why try to break 128-bit AES encryption when I can see your dog’s name on every instagram post? The user is most commonly the weakest point in security.