• 2 Posts
  • 4 Comments
Joined 2 years ago
cake
Cake day: November 15th, 2023

help-circle
  • You are right and what some people miss is that social engineering being the vector to gain foothold doesn’t mean that it was sufficient to allow the breach. Almost always you need some other weakness (or a series of them). Except when the weaknesses are so had that you don’t need a foothold at all (like this case), or when the social engineering gives you everything (rare, but you might convince you someone to give you access to data etc.).

    A whole separate conversation is deserved by how effective (or not) social engineering training is. Quite a few good papers about the topic came out in the last fee years.



  • This also takes away agency from people. In fact, I am sure that there would be a way to diagnose every single relationship ever as a form of abuse in which someone takes advantage of someone else’s something.

    Adults are responsible for their choices, and particularly in the case of “assholes”, that is often associated with being assertive, dismissive and some people just like that kind of “I am the main character” features. Maybe there are even some deep rooted evolutionary reasons for that, I don’t know. Anyway, painting anything as victim-oppressor dichotomy IMHO is nonsense.