Security notes - security for the everyday person: Difference between revisions

From Helpful
Jump to navigation Jump to search
Line 83: Line 83:
<!--
<!--


tl;dr: if you think you'll lose it, and want to ensure that the next reboot people will have a ''hard'' time getting in, yes.
tl;dr:
: if you think you'll lose it, and want to ensure that the next reboot people will have a ''hard'' time getting in, yes.


: keep in mind that encrypted devices does not do much against law enforcement,
:: in that in a lot of places, you are more or less ''required'' to give them access somehow, and your refusal will have implications.




What makes more-mobile devices special is that they are ''usually'' in environments you can't trust. Physically, that is.
 
What makes more-mobile devices special is that they physically are ''usually'' in environments you can't trust.


Data-at-rest encryption is arguably largely about theft of the device the storage is in.
Data-at-rest encryption is arguably largely about theft of the device the storage is in.

Revision as of 16:38, 8 April 2024

Security related stuff.


Linux - PAM notes · SELinux

Securing services


A little more practical


More techincal waffling

Message signing notes · Hashing notes ·
Auth - identity and auth notes
Encryption - Encryption notes · public key encryption notes · data-at-rest encryption ·pre-boot authentication · encrypted connections

Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted

Is it important to use antivirus/malware protection?

Is it important to encrypt my PC?

Is it important to encrypt my laptop or phone?

Is it important to use two-factor authentication?

Is it important to use a password manager?

Is it important to use a VPN?

Is it important to use secure mail?

So these messenging apps are the end-all then?