Difference between revisions of "Exploits"

Jump to navigation Jump to search
17 bytes added ,  09:52, 29 April 2022
m
added a link
(added a page)
 
m (added a link)
Line 1: Line 1:
Exploit or a crypto exploit describes a way for a 3rd party to extract value from a protocol or person using more technical means (in contrast to social engineering in [[Crypto Scams|crypto scams]]).
Exploit or a crypto exploit describes a way for a 3rd party to extract value from a protocol or person using more technical means (in contrast to social engineering in [[Crypto Scams|crypto scams]]).


Most exploits can be described as malicious, but not all exploits are malicious (see "Code is law").
Most exploits can be described as malicious, but not all exploits are malicious (see: [[Code is law|"Code is law"]]).
{| class="wikitable"
{| class="wikitable"
|+
|+
61

edits

Navigation menu