My thoughts, experiments, and musings on technology
IntroductionIn the popular imagination, a cyberattack involves a hooded figure in a dark room, typing lines of glowing green code to bypass high-tech ...