That can then enable what we call social engineering, the more regular person-to-person way to con your way into getting access. That is not just by running programs alone. This is just making sure that people can get the kind of insider information that are prerequisites of starting such person-to-person operations by themselves.

Keyboard shortcuts

j previous speech k next speech