Return to Article Details PHISHING ATTACKS ON ENCRYPTED MESSENGERS: METHODS, RISKS AND PROTECTION RECOMMENDATIONS (USING THE EXAMPLE OF SIGNAL MESSENGER) Download Download PDF