Separate names with a comma.
Discussion in 'Politics & World News' started by johnbryanpeters, Nov 15, 2012.
Bruce Schneier on real and imagined cybernetic threats.
Please register to disable this ad.
the real cyber threat usually comes from the intended users
Y' think? People do the goddamnedest stupid things, but we as technocrats ought to be cranking out hardware and software that is less vulnerable.
Even if that's done, sure, I'll send you $5K based on a phone call, to get that $2M lottery you say I won...