Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So they’ll call you first with the fake video of your mom.

You’ll be suspicious and ask for the pass phrase. The attacker now knows the nature of the protection you setup between you and your mom.

And then the real attack on your mom, with you describing the system you’d agreed to, and claiming you can’t remember the word/phrase.

Better is the Terminator-style lie to see if it gets detected.



Mom-in-the-middle attack




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: