I am not trolling you… You brought up NiceHash out of nowhere, you seemed misinformed and I wanted to attempt to give you the truth/facts.
Again your words "The hack on NiceHash wasn’t an actual hack on system but a ‘profiling’ attack where they gained access through an engineers credentials. "
Then again your words “As far as the NiceHash, it was a hack but there is a difference in the style of hacking. Profiling hacks are not a compromise of the security of the S/W itself.”
First you say it wasn’t a hack it was a profile attack, then when I counter your post now its is a hack just a different type of hack.
Lets be very clear about this: If a person can gain unauthorized access to any software, no matter how it was obtained, then there is a security problem and it is considered by the term hack. If the software, that deals in currency in the millions didn’t require an authenticator that passcode changes every 30 to 60 seconds, didn’t require a changing the master password every 30 to 60 days with rules in place that it be a minimum of 18 alpha numberic charactor upper case with requirements with no more than 3 of each at a time, then they have a software/security problem.
I am in the industry, I have been for several decades. I have certifications that don’t exist anymore, security clearances that allow me access to secure DHS secured server rooms. I receive daily threat assessments from the HLS and DOD about potential internet, network, and security threats. blah blah blah…
I know the word, meaning, and definition of the term “Hack” and how it has evolved over the last 30+ years.
There are always those in some industry who don’t consider something; there are those who even today think the earth is flat, but I digress.
I will heed your advice and this will be the last reply from me to any thread where you are inquiring information.
I do wish you the best of luck and I hope you learn a lot here in the forums
Good luck and happy holidays