Follow

's article on exploiting is a nice example to work through to understand how an advanced works
arstechnica.com/information-te

Does anyone have any examples of advanced that were not targeted? I guess the and maybe are examples. I'd love to see a story about a recent exploit like this (those two examples don't really work when HTTPS is used).

Sign in to participate in the conversation
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml