Security notes - security for the everyday person: Difference between revisions
Jump to navigation
Jump to search
Line 251: | Line 251: | ||
==Is it important to use a VPN?== | ==Is it important to use a VPN?== | ||
<!-- | <!-- | ||
Two decades after being products, VPNs are suddenly | Two decades after being serious products, VPNs are suddenly in vogue. | ||
But do you need them? | But do you need them? | ||
Line 258: | Line 259: | ||
Depends. | Depends. | ||
In security, you do threat modeling, a.k.a. figuring out '''what problem you are trying to solve'''. | |||
Because if it solves problems you didn't have in the first place, | Because if it solves problems you didn't have in the first place, | ||
based on "overheard in public", and [[fud|fear, uncertainty, and doubt]], | based on "overheard in public", and [[fud|fear, uncertainty, and doubt]], | ||
then you bought | then you bought a sales pitch, rather than actual security. | ||
This can even have negative effects, e.g. when you think you are safer | This can even have negative effects, e.g. | ||
when actually nothing changed in your safety | |||
but you think you are safer, and act more careless. | |||
Revision as of 11:50, 28 February 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |