The Lore Of Hijacking Systems, Part 1

Law 0: List all knowns and unknowns that may hint the path to the infiltration (and later exfiltration).

Compatible to known system or protocols also means compatible inherit the same limits, flaws and risks.

Law 1: Technology is not a panacea.

Corollary: Technology is not just machines, it is `(Hu)man, machine, method`.Your machines can betray you. 
Example Attack:
Attackers do not have to steal your phone. They just…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store