• db2@lemmy.world
    link
    fedilink
    arrow-up
    11
    ·
    8 months ago

    The “users” are probably the weak point. Badly configured setups leaking info, aggregation using that info to fingerprint a user, etc. When they have a user account with access they can use it to keep collecting data and digging. I imagine it’s a slow process. Nothing networked can be 100% secure though.