Online identity is a ticking time bomb. Are trustworthy, open-source solutions ready to disarm it? Or will we be stuck with lackluster, proprietary systems?
We're breaking down the attack: how it works, how it was hidden, and why time was running out for the attacker.