You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 1, 2023. It is now read-only.
TLDR: How technical should I make the hacker route?
What should we include for the hacker route? I am asking as there are actually a few types of hackers, namely social engineers, and 'hackers'. Most of the time "hacking" is in fact a very elaborate and technical digital scam, while actually hacking is a far more subtle, and difficult process. I can do either, but I am not sure which fits the project better.
The text was updated successfully, but these errors were encountered:
I think which ever would be easier to implement. While social engineering is the more common, it seems like it might be easier to abstract the other method.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
TLDR: How technical should I make the hacker route?
What should we include for the hacker route? I am asking as there are actually a few types of hackers, namely social engineers, and 'hackers'. Most of the time "hacking" is in fact a very elaborate and technical digital scam, while actually hacking is a far more subtle, and difficult process. I can do either, but I am not sure which fits the project better.
The text was updated successfully, but these errors were encountered: