Security notes - security for the everyday person: Difference between revisions
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 178: | Line 178: | ||
Also, there is a gliding scale of convenience, and threat modeling. | |||
Most are still good against casual theft, but if you are a person of interest, maybe double check. | |||
This isn't about how many bits the encryption has, it's where | |||
* the key is kept when it's off | |||
* where it's kept when it's on | |||
* the steps you need to do to have it become readable | |||
:: and its compatibility | |||
Say, if something is transparently encrypted -- it says it is but you never have to put in anything -- | |||
that often means that the drive is good within a specific computer - basically, it being in that computer | |||
means you get in automatically, and if people steal just the drive, chances are they will never get in. | |||
The thing is if that is a laptop, it's easier to steal the entire thing in the first place. | |||
--> | --> | ||
Line 512: | Line 528: | ||
And yes, some of that is technical, but a lot of it looks technical but ends up being a very practical thing | And yes, some of that is technical, but a lot of it looks technical but ends up being a very practical thing. | ||
There is a very real question that -- again -- comes down to [[threat modeling]]. | |||
: Is it that you are political and want to not get into shit? | : Is it that you are political and want to not get into shit? | ||
: Is it that actually want it to never be read? | : Is it that actually want it to never be read? |
Revision as of 11:01, 15 April 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |