• freagle@lemmygrad.ml
    link
    fedilink
    English
    arrow-up
    12
    ·
    4 hours ago

    Yes, they are mapping human networks because humans are the weakest link in any security. Once you know who’s talking with whom, when, where, and how frequently, you can essentially get anything you need by finding the weakest links and exploiting them.