Difference between revisions of "Exploits"

Jump to navigation Jump to search
(added a page)
 
m (added a link)
Line 1: Line 1:
Exploit or a crypto exploit describes a way for a 3rd party to extract value from a protocol or person using more technical means (in contrast to social engineering in [[Crypto Scams|crypto scams]]).
Exploit or a crypto exploit describes a way for a 3rd party to extract value from a protocol or person using more technical means (in contrast to social engineering in [[Crypto Scams|crypto scams]]).


Most exploits can be described as malicious, but not all exploits are malicious (see "Code is law").
Most exploits can be described as malicious, but not all exploits are malicious (see: [[Code is law|"Code is law"]]).
{| class="wikitable"
{| class="wikitable"
|+
|+