Pretty much what the title asks.
What techniques do you see no longer working and which ones will carry over?
Evil twin avatars?
Engineers creating an avatar for a specific role to play?
What are your thoughts?
[link] [comments]
from hacking: security in practice https://ift.tt/3qHCKtb
Comments
Post a Comment