top | item 30719650

(no title)

raghava | 4 years ago

Yes. That's why a cluster of elements for a "secret identity theme", instead of just one image. (After all, infosec/security is finally just a game of making reward-to-effort ratio too impractical for most threat-actors & thus achieve reasonable 'sense of security', in a world where exploits exist for almost every ring in the stack - including ring 0)

I feel BITB mostly gets used by those who may not really be having access to lob a proxy attack at the intended target as well, which filters a good set, among potential victims.

discuss

order

hapidjus|4 years ago

Maybe I’m misunderstanding but what’s preventing you from passing on the cluster?

raghava|4 years ago

Didn't get your concern. I was saying that BITB actors typically won't be running a proxy within the network.