Security notes - security for the everyday person: Difference between revisions

From Helpful
Jump to navigation Jump to search
Line 178: Line 178:




Also, there is a gliding scale of convenience, and threat modeling.
Most are still good against casual theft, but if you are a person of interest, maybe double check.
This isn't about how many bits the encryption has, it's where
* the key is kept when it's off
* where it's kept when it's on
* the steps you need to do to have it become readable
:: and its compatibility
Say, if something is transparently encrypted -- it says it is but you never have to put in anything --
that often means that the drive is good within a specific computer - basically, it being in that computer
means you get in automatically, and if people steal just the drive, chances are they will never get in.
The thing is if that is a laptop, it's easier to steal the entire thing in the first place.


All but the worst are still good against casual theft.


Yet if you are a person of interest, maybe double check .


-->
-->

Revision as of 11:01, 15 April 2024

Security related stuff.


Linux - PAM notes · SELinux

Securing services


A little more practical


More techincal waffling

Message signing notes · Hashing notes ·
Auth - identity and auth notes
Encryption - Encryption notes · public key encryption notes · data-at-rest encryption ·pre-boot authentication · encrypted connections

Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted

Is it important to use antivirus/malware protection?

Is it important to encrypt my laptop or phone?

Is it important to encrypt my PC?

Is it important to encrypt my external drive?

Is it important to use two-factor authentication?

Is it important to use a password manager?

Is it important to use a VPN?

Is it important to use secure mail?

So these messenging apps are the end-all then?