Posted

in

@JoelGratcyk @TwitterChicago Either a rogue employee or something like a complete takeover of someone’s machine. Able to bypass a lot of restrictions that way, keystroke logger installed to get the password for their password tracker, some of them let you store 2fa within it, etc.

Comments

One response

  1. kraft
    kraft

    @JoelGratcyk @TwitterChicago Those are my initial bets.

To respond on your own website, enter the URL of your response which should contain a link to this post’s permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post’s URL again. (Find out more about Webmentions.)