From 713f7de00686e84aea3cfd99e389bf6392dd9326 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Fri, 14 Oct 2022 14:06:41 +1300 Subject: [PATCH] vault backup: 2022-10-14 14:06:41 --- content/notes/ass03-security-flaws-essay.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/notes/ass03-security-flaws-essay.md b/content/notes/ass03-security-flaws-essay.md index 0773bdb8c..c29d560d0 100644 --- a/content/notes/ass03-security-flaws-essay.md +++ b/content/notes/ass03-security-flaws-essay.md @@ -28,7 +28,7 @@ Brandom was not an extremely easy target, he used two-factor authentication, sec So why did the hacker choose Brandom as their victim? It's clear they chose Brandom because they knew in advance that he had a Coinbase account. It's likely his email was leaked in a list of Coinbase users or from an equipment manufacturer or a bitcoin retailer. The fact is, when people like Brandom have so many different account, all linked together, there is a very large attack surface. This makes it more likely that a hacker will be able to find *some* way to compromise your digital life. # What do they have in common? -Although the events describes in these articles are unfortunate to put it midly, they do provide valuable insight into the practi +Although the events describes in these articles are unfortunate to put it midly, they do provide valuable insight into the security practices of those individuals and companies affected. - both stories of people being hacked