• 0 Posts
  • 4 Comments
Joined 2 years ago
cake
Cake day: November 15th, 2023

help-circle

  • Well, you did call it a “failed experiment”, that doesn’t sound right when it is the most used OS on the planet, on supercomputers, on servers, on phones.

    People answered with a broad response to a broad statement.

    Anyway, if this rage is medically induced and this topic seems to trigger you, why not blocking it? I think you can see how you are not going to convince anybody that your experience 20-30 years ago with Linux is applicable today, especially when people with 0 tech skills manage to daily drive a Linux dietro or use it for gaming. So why doing this to yourself?

    Researching IED, avoidance for “situations that upset you” seems to be one of the few recommended prevention mechanisms. You will get banned anyway eventually from the community, why not just blocking it in advance?



  • You are right and what some people miss is that social engineering being the vector to gain foothold doesn’t mean that it was sufficient to allow the breach. Almost always you need some other weakness (or a series of them). Except when the weaknesses are so had that you don’t need a foothold at all (like this case), or when the social engineering gives you everything (rare, but you might convince you someone to give you access to data etc.).

    A whole separate conversation is deserved by how effective (or not) social engineering training is. Quite a few good papers about the topic came out in the last fee years.