Security notes - security for the everyday person: Difference between revisions
Jump to navigation
Jump to search
Line 83: | Line 83: | ||
<!-- | <!-- | ||
tl;dr: if you think you'll lose it, and want to ensure that the next reboot people will have a ''hard'' time getting in, yes. | tl;dr: | ||
: if you think you'll lose it, and want to ensure that the next reboot people will have a ''hard'' time getting in, yes. | |||
: keep in mind that encrypted devices does not do much against law enforcement, | |||
:: in that in a lot of places, you are more or less ''required'' to give them access somehow, and your refusal will have implications. | |||
What makes more-mobile devices special is that they are ''usually'' in environments you can't trust | |||
What makes more-mobile devices special is that they physically are ''usually'' in environments you can't trust. | |||
Data-at-rest encryption is arguably largely about theft of the device the storage is in. | Data-at-rest encryption is arguably largely about theft of the device the storage is in. |
Revision as of 16:38, 8 April 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |