Security notes - security for the everyday person: Difference between revisions
Jump to navigation
Jump to search
Line 178: | Line 178: | ||
Also, there is a gliding scale of convenience, and threat modeling. | |||
Most are still good against casual theft, but if you are a person of interest, maybe double check. | |||
This isn't about how many bits the encryption has, it's where | |||
* the key is kept when it's off | |||
* where it's kept when it's on | |||
* the steps you need to do to have it become readable | |||
:: and its compatibility | |||
Say, if something is transparently encrypted -- it says it is but you never have to put in anything -- | |||
that often means that the drive is good within a specific computer - basically, it being in that computer | |||
means you get in automatically, and if people steal just the drive, chances are they will never get in. | |||
The thing is if that is a laptop, it's easier to steal the entire thing in the first place. | |||
--> | --> |
Revision as of 11:01, 15 April 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |