Jenny

12%
Flag icon
If I can impersonate you to your devices, I can take advantage of you. This is the identity theft of the future, and it’s scary. If I can feed your devices faulty information, I can manipulate those devices in a harmful way. If I can fool your devices into thinking I’m more trusted than I am, I can give commands in your name. We don’t fully understand the consequences of these attacks, because we don’t fully understand the scope of the systems.
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Rate this book
Clear rating
Open Preview