this post was submitted on 29 Sep 2024
6 points (100.0% liked)
Cyber Security
32 readers
1 users here now
๐ต๐ฟ Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.
Questions and answers are encouraged. Be excellent to each other. ๐๏ธ
founded 3 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I posit that the point of the video is that port changing is an inconvenience non-feature, especially at scale of distributed legitimate use.