Security notes - security for the everyday person: Difference between revisions

From Helpful
Jump to navigation Jump to search
Line 90: Line 90:




What makes more-mobile devices special is that they physically are ''usually'' in environments you can't trust,
and unlike most other kinds of devices, not doing that ''defeats their point''.


What makes more-mobile devices special is that they physically are ''usually'' in environments you can't trust.
Data-at-rest encryption is arguably largely about theft of the device the storage is in.




Data-at-rest encryption is arguably largely about "what happens when the people steal the storage and/or device that contains it?"


After it's stolen and it's still on, this encryption does not yet play a role.
After it's stolen and it's still on, this encryption does not yet play a role.

Revision as of 16:39, 8 April 2024

Security related stuff.


Linux - PAM notes · SELinux

Securing services


A little more practical


More techincal waffling

Message signing notes · Hashing notes ·
Auth - identity and auth notes
Encryption - Encryption notes · public key encryption notes · data-at-rest encryption ·pre-boot authentication · encrypted connections

Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted

Is it important to use antivirus/malware protection?

Is it important to encrypt my PC?

Is it important to encrypt my laptop or phone?

Is it important to use two-factor authentication?

Is it important to use a password manager?

Is it important to use a VPN?

Is it important to use secure mail?

So these messenging apps are the end-all then?