some malware functions by presenting an informational surface conforming to a system's expectations for a good-faith counterparty & upon being accepted into the high-trust circle within the system boundary, abusing its privileges to extract value

certain people are like this too

Follow

they project a friendly persona custom-designed to appeal to one's preferences, and when granted trust, exploit the relationship for their own gain, effectively operating as a parasite

keep this in mind when being friendly w/ internet personas; how much should you trust them?

Sign in to participate in the conversation
Mastodon

a Schelling point for those who seek one