Security notes - security for the everyday person: Difference between revisions

From Helpful
Jump to navigation Jump to search
mNo edit summary
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{#addbodyclass:tag_tech}}
{{#addbodyclass:tag_security}}
{{SecurityRelated}}
{{SecurityRelated}}


Line 151: Line 153:
: again, keep in mind that encrypted devices does not do much against law enforcement,  
: again, keep in mind that encrypted devices does not do much against law enforcement,  
:: in that in a lot of places, you are more or less ''required'' to give them access somehow, and your refusal will have implications.
:: in that in a lot of places, you are more or less ''required'' to give them access somehow, and your refusal will have implications.
Footnotes:
* "encrypt my PC" is usually variably used to mean
:: "encrypt the system drive
:: "encrypt user data"
:: ...or other things
* added disks would have to be separately encrypted
-->
==Is it important to encrypt my external drive?==
<!--
If it's portable and you care about what happens when it gets stolen, yes.
That said,
* some of the solutions used by external disk are less secure than they could be
* some of the solutions used by external disk are bad.
* some of the implementations have been very flawed
Also, there is a gliding scale of convenience, and threat modeling.
Most are still good against casual theft, but if you are a person of interest, maybe double check.
This isn't about how many bits the encryption has, it's where
* the key is kept when it's off
* where it's kept when it's on
* the steps you need to do to have it become readable
:: and its compatibility
Say, if something is transparently encrypted -- it says it is but you never have to put in anything --
that often means that the drive is good within a specific computer - basically, it being in that computer
means you get in automatically, and if people steal just the drive, chances are they will never get in.
The thing is if that is a laptop, it's easier to steal the entire thing in the first place.




Line 482: Line 530:




And yes, some of that is technical, but a lot of it looks technical but ends up being a very practical thing -- there is a very real question that comes down to [[threat modeling]].
And yes, some of that is technical, but a lot of it looks technical but ends up being a very practical thing.
 
There is a very real question that -- again -- comes down to [[threat modeling]].
: Is it that you are political and want to not get into shit?
: Is it that you are political and want to not get into shit?
: Is it that actually want it to never be read?  
: Is it that actually want it to never be read?  

Latest revision as of 00:20, 22 April 2024

Security related stuff.


Linux - PAM notes · SELinux

Securing services


A little more practical


More techincal waffling

Message signing notes · Hashing notes ·
Auth - identity and auth notes
Encryption - Encryption notes · public key encryption notes · data-at-rest encryption ·pre-boot authentication · encrypted connections

Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted

Is it important to use antivirus/malware protection?

Is it important to encrypt my laptop or phone?

Is it important to encrypt my PC?

Is it important to encrypt my external drive?

Is it important to use two-factor authentication?

Is it important to use a password manager?

Is it important to use a VPN?

Is it important to use secure mail?

So these messenging apps are the end-all then?