4
Techniques that Attackers Use to Compromise Privacy
Newer technologies are introduced frequently, and our lifestyles constantly move us closer to cyberspace. Our relationship with the internet is getting stronger while exposing us more to the unregulated internet. A little over two decades ago, the only way we connected to the internet was through emails. We had dial-up connections, which prevented us from creating a stronger relationship with the internet due to the slow speed and time-based connectivity. When faster broadband connections were introduced, we started forming stronger relationships with cyberspace due to speedy and stable connectivity, irrespective of the time we stayed connected.
In the dial-up days, we connected to the internet ...
Get An Ethical Guide to Cyber Anonymity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.