Re: Bah
Surely that's beside the point? It's not about how you attack a system, but how far and wide you can go once you've accessed it. You've stolen a valuable key, but how much more might it unlock than just a phone number used for 2FA?
Surely that's beside the point? It's not about how you attack a system, but how far and wide you can go once you've accessed it. You've stolen a valuable key, but how much more might it unlock than just a phone number used for 2FA?