Post
Topic
Board Securities
Re: ASICMINER: Entering the Future of ASIC Mining by Inventing It
by
Jutarul
on 22/02/2014, 23:30:51 UTC
Could this explain how some clever individual (who isn't your gf or dog) with a privileged network position in Thailand managed to swipe your Havelock password, 2FA, and btc?

so im no hacker but you are actually telling me that people using Maverick can get hacked because of a flaw in it? ://// should we install another OS??
sweet. that's a serious man in the middle bug.

There is some protection against it, which e.g. is buying a VPN connection (which removes some of the man in the middle attack vectors). But it shows that even a perceived secure system can be flawed, which highlights the importance of non-computational security measures (i.e procedural security).