• @[email protected]
      link
      fedilink
      5
      edit-2
      28 days ago

      Like “hacking.” The vast majority of breaches are accomplished by password acquisition or social engineering. Why try to break 128-bit AES encryption when I can see your dog’s name on every instagram post? The user is most commonly the weakest point in security.

    • Iapar
      link
      fedilink
      528 days ago

      Thought a glitch is when a graphical interface bugs with artifacts and such.