Resilient-to-Targeted-Impersonation


Description

Specific users cannot be impersonated by an attacker (e.g. acquaintance) through the use of personal information (e.g. significant dates such as birthdays, names of relatives or pets, etc.).