• disguy_ovahea@lemmy.world
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    5 months ago

    Like “hacking.” The vast majority of breaches are accomplished by password acquisition or social engineering. Why try to break 128-bit AES encryption when I can see your dog’s name on every instagram post? The user is most commonly the weakest point in security.