|
December 29, 2015, 07:06:33 PM Last edit: December 29, 2015, 07:31:25 PM by bit1 |
|
Updating:
1- Scam 2- Virus/Malware/Trojans 3- Steal wallets 4- Espionage purposes 5- Hacker activity. 6- Marketing. 7- Get emails, ID Social networks. 8- For fun.
Scam, It is well known but there are other aspects to be discussed. Examples are welcome.
Why after so many years of releases it has not been achieved establish a security protocol by having community experts give the green or red light to a project that can be used by the most inexperienced to ward off these threats.
|