Security notes - security for the everyday person: Difference between revisions
Jump to navigation
Jump to search
Line 64: | Line 64: | ||
==Is it important to encrypt...=== | ==Is it important to encrypt...=== | ||
===Is it important to encrypt my laptop or phone?== | ===Is it important to encrypt my laptop or phone?=== | ||
<!-- | <!-- | ||
tl;dr: | tl;dr: | ||
* if you think | * if you think it'll get stolen specifically for the data on it, sure | ||
* it helps against some [[evil maid]] style attacks | |||
* if you think a not-specifically-interested thief might still poke around, and want peace of mind that they can't, yes | |||
:: it's not hard to lose a phone | |||
* do not assume encrypted devices do much against law enforcement, | * do not assume encrypted devices do much against law enforcement, | ||
:: in that in a lot of places, you are more or less ''required'' to give them access somehow, and your refusal will have implications | :: in that in a lot of places, you are more or less ''required'' to give them access somehow, and your refusal will have implications | ||
* if you want to sure that after the next reboot people will have a ''hard'' time getting in, yes. | |||
: '''but''' If it's still on, you might be protected by nothing other than screen lock | |||
Line 79: | Line 88: | ||
{{comment|(and unlike most other kinds of devices, not taking them there ''defeats their point'' so people just ''will do that'')}}. | {{comment|(and unlike most other kinds of devices, not taking them there ''defeats their point'' so people just ''will do that'')}}. | ||
But also that more design went into | |||
Revision as of 15:12, 27 June 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |