Chapter 15. The Benefits of Being a Victim
In which we conclude that approaching life with due optimism may help us track down the attacker
I have discussed a variety of problems that can have a significant cumulative impact on all daily communications, risks that we are not always comfortable with. You have seen how others can exploit the network to steal information or to get more than you expect or would allow them to, as well as how to use these techniques to gather more information about your enterprise or home network, and attackers that target it.
I hope I have offered both useful insight into how problems like these are born and how to avoid them whenever possible. I’ve tried to show that security and privacy implications are simply a part ...