Forthewin1123
New member
- Joined
- Mar 7, 2020
- Messages
- 630
- Reaction score
- 132
I don’t know alot about this stufff… I don’t understand how they get in the email chain… like how do they see a email was sent to said address and then know to intercept and take over?? But it happens alot … it will happen alot for a few weeks then calm down for a bit and then ramp back up again…
So why don’t we change how we communicate? Why do we keep doing it and pretty much handing our coin over to them? We know ots a weak way to communicate since they do this alot right? I want to take this chance to learn here too so if someone can explain why we don’t chamge or cant change I’m all ears … or how the hackers do this… It just seems like common sense to me that we as a whole come together and agree or research a new way to communicate that is just as safe or safer… for both source and customer… right?
Anyone have any input or something that adds to this or can teach why this works or why we can’t chamge I’m all ears and looking.forward to hear from you guys
So why don’t we change how we communicate? Why do we keep doing it and pretty much handing our coin over to them? We know ots a weak way to communicate since they do this alot right? I want to take this chance to learn here too so if someone can explain why we don’t chamge or cant change I’m all ears … or how the hackers do this… It just seems like common sense to me that we as a whole come together and agree or research a new way to communicate that is just as safe or safer… for both source and customer… right?
Anyone have any input or something that adds to this or can teach why this works or why we can’t chamge I’m all ears and looking.forward to hear from you guys
Last edited: