• disguy_ovahea@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    1 month ago

    Like “hacking.” The vast majority of breaches are accomplished by password acquisition or social engineering. Why try to break 128-bit AES encryption when I can see your dog’s name on every instagram post? The user is always the weakest point in security.