Advanced persistent threats are one of the most draining of attacks. The fear factor is high and constant, grinding down the target for a prolonged period.
At this moment in time I am resilient, but the emotion
burden is heavy and has a really negative impact on other activities triggering
procrastination, rage, thoughts of retaliation and ultimately retribution.
I find myself looking for a source of solace. DENIED
Division 2 Raids are simply work. This game mode brings out the best in any
squad with 8 players actually working together I see planning, teamwork,
persistence, critical learning, voice communications and statistical analysis
playing a big part in defeating the bosses.
I’m working on my Merciless build and practicing the explosive damage feature and should be raid ready in July.
Like most online gamers my Data is out there in the wild for
anyone to see. Tracker sites publicly
share valuable profile statistics so you can look up your potential squad
members easily.
So far, the data looks fair accurate but no doubt paying members get fresher intelligence.
Gamer privacy: There’s nothing a gamer can do to restrict this data…just don’t play would be a solution.
ClickOnyxDC Division 2 Play
Details * sourced from https://tracker.gg
The definition of an expert is a person who is very knowledgeable about or has mastery in a particular area.
Here’s another definition of an Information Security Specialist
or whatever the Firewall guy is called nowadays.
Expert idiot
I was so unprepared for the Division 2 Raid that I had to go back to the drawing board to look at my built from knee pads to backpack to armour and guns. So much for being an expert gamer.
The case of remaining anonymous is harder today that at any time in my father’s life. Today, being untraceable, unlinkable and unobserved is a gargantuan fight as regular users armed with powerful mobile computers wonder around taking images and video and immediately uploading publicly.
Show us your Donuts!!
You can control it but friendly 3rd parties and family members are often the prime suspects to breaking your chain of defense.
Next time someone takes of picture of me I’m gonna freaking destroy
their precise device and see if they mind it or not. Well, maybe this is going
to far but I feel strongly about the issue of eroding privacy and leaving a public
evidence that will be there in 10-20 year time.
The formula for an emotional exploit has been around for centuries
and is still pretty effective.
Basic step-up question: Do you Love me?
Basic exploit question: Can you send me some money?
Decision 1: Say No and expect the “You don’t really Love me ” comment
Decision 2: Say Yes and know that you are betraying yourself as a sucker
The strategy to just to create time pressured confused and emotional conflict. This makes it tough for the target to make a rational decision, in fact the wrong decision will often seem like the absolbute right and justified thing to do.
Exploiters with finesse blend their attack with subtle time pressure and set-up friendly history and established heartfelt trust where they have actually given money to the target.
Honey trap or tasty treat?
I use cookies and similar technologies to collect and process personal data that monitors your activities and preferences.
I assume you accept this.