Quote:
Originally Posted by pwalker8
It's correct that you shouldn't use the same password for different sites. Pass that, most individuals don't need CIA level security.
|
Back in the 1950's, that would have been the case.
Today, any self-respecting hacker worthy of the name, has a toolchain that is equal to what is available to any TLA.
Defining security threats, and threat models is more important than it has been in the past. However, the starting point should be that the resources that were once exclusive to TLAs with an extremely high budget, are now available to virtually anybody who has the forwithall to utilize them. That means that one needs to assume that the CIA is the least competent threat to one's security, not the most competent.
###
Rephrasing.
If somebody wants to target you, they can get more data about you today, from commercial vendors, than the entire range of Five Eye Intelligence Agencies, plus the Chinese Intelligence Agencies, alongside their puppet states, plus the Russian Intelligence Agencies could have obtained about you, as recently as five years ago.
If your concern is drive-by attacks, the tools used today are from nation-state TLAs.