Comment on Israel’s IDF Bans Android Phones—iPhones Now ‘Mandatory’
favoredponcho@lemmy.zip 17 hours agoI’m not sure what point you’re trying to make. The article you link still shows Israel’s military requiring soldiers to use iPhones and not Android devices for security purposes. Just because a hack is achieved through user action doesn’t mean OS security can’t mitigate or aggravate an intrusion. It seems Israel is acknowledging that by setting this new requirement.
Xatolos@reddthat.com 17 hours ago
Ah yes, the old “reading is hard so I ignore the facts”. A classic.
Maybe you could ask Apple Intelligence to explain it to you, and what’s the difference between computer security and social engineering.
favoredponcho@lemmy.zip 16 hours ago
Here is something for you to read from the article you posted:
Xatolos@reddthat.com 16 hours ago
Good, good. You’re learning basic reading. Now continue read the rest of it.
Also, since you have no understanding of cyber security, here is Chatgpt to help explain the difference between it and social engineering. I even got it to explain it to a child’s level so it won’t have any scary big words to frighten you:
Cybersecurity is like locking the doors and windows of your house so strangers can’t sneak in and take your toys or mess with your stuff. It uses tools like passwords, codes, and special locks on computers to keep everything safe.
Social engineering is when a trickster doesn’t try to break the lock but instead pretends to be your friend or someone you trust, so you open the door for them. For example, they might say, “I’m your teacher, give me your homework password,” even though they’re not really your teacher.
The difference: Cybersecurity is about building strong locks, while social engineering is about tricking people into opening the door themselves.
favoredponcho@lemmy.zip 16 hours ago
I have a degree in cybersecurity and my day job is in cybersecurity. You’re not actually making a point that makes any sense to the original argument. Also, you missed the point I made. You also seem to not really be capable of connecting the dots made by the article that you linked. It’s the same point.
Here is a question for you: if the issue is members of the IDF are falling for honeypots and social engineering, why then is the IDF restricting its members to using Apple iPhones?
Hint: the answer is in your article.