Originally Posted by Avonosac
I got sick of rolling my eyes after just the first few sentences. You're missing the forest for the trees. You seem to be an android aficionado, but you aren't a security aficionado and you don't understand how attackers work.
One thing I never get tired of is learning, I'm all ears. So instead of one liner'ing it, let me know how I am wrong and what exactly it is I am missing.
I think of myself as pretty damn security aficionado, but I have a rule; I don't usually consider "social engineering" a valid security vulnerability/attack vector. I have no sympathy for getting owned by blindly trusting some one source, downloading sketchy stuff and/or mindlessly clicking through permissions without understanding them (whether that be phone, desktop or whatever) or running everything in admin mode. So if your post is going to "educate" me about how attackers work by tricking stupid people I don't consider that valid. Another thing, I made that post under the assumption that if you're here reading it, you are at least half knowledgeable and already have a good security setup. So even if you did have your token authentication whatever cracked you were smart enough to set up some kind of compartmentalization system for your personal security. Meaning that one thing being cracked wouldn't allow someone to hijack your life.
Asus Prime X370-A AMD Ryzen AM4 DDR4
Gigabyte GeForce GTX 950
2x Corsair Valueselect 8GB 288 Pin DDR4 SDRAM DDR4 @ 2133
Corsair Force LS 2.5" 120GB SATA III MLC SSD
Lite-On 24X SATA DVD/RW Optical Drive
Corsair RM550x 550W 80 Plus Gold
Noctua NH-L9A-AM4 Low-Profile
Antec NSK4100 Steel ATX Mid Tower
Mint 18.2 x64
HP 24" LCD/LED 1920x1080
Asus Essence STX II
▲ hide details ▲
Last edited by xJumper; 05-02-2019 at 12:52 AM.