• @[email protected]
      link
      fedilink
      6
      edit-2
      6 months ago

      Like “hacking.” The vast majority of breaches are accomplished by password acquisition or social engineering. Why try to break 128-bit AES encryption when I can see your dog’s name on every instagram post? The user is most commonly the weakest point in security.

    • Iapar
      link
      fedilink
      56 months ago

      Thought a glitch is when a graphical interface bugs with artifacts and such.