8.14 SOCIAL ENGINEERING
EXERCISE 8.14: SOCIAL ENGINEERING
This is a though exercise; there is no programming involved. How might ve try to get others using less secure software? What could she do to convince them to use a poorly configured SSL context?