Security notes - security for the everyday person: Difference between revisions
Jump to navigation
Jump to search
Line 255: | Line 255: | ||
Depends | |||
Depends. | |||
Let's do some threat modeling, a.k.a. figuring out '''what problem you are trying to solve'''. | |||
Because if it solves problems you didn't have in the first place, | Because if it solves problems you didn't have in the first place, | ||
based on "overheard in public", and [[fud|fear, | based on "overheard in public", and [[fud|fear, uncertainty, and doubt]], | ||
then you bought one based on a sales pitch. | then you bought one based on a sales pitch. | ||
Line 283: | Line 286: | ||
* Defeating the fact that some sources of internet will snoop on your traffic, be it your ISP or public WiFi. | * Defeating the fact that some sources of internet will snoop on your traffic, be it your ISP or public WiFi. | ||
: this can be overstated, because in many | : this can be overstated, because in many countries such snooping is illegal -- but that doesn't mean they don't, and it may not apply to your country | ||
: so it's partly overplayed marketing [[fud]], partly not | : so it's partly overplayed marketing [[fud]], partly not | ||
:: Redundant in that: the network can't snoop on the contents of HTTPS website traffic, which is now common on everything (and always was on important sites like banks and such) | :: Redundant in that: the network can't snoop on the contents of HTTPS website traffic, which is now common on everything (and always was on important sites like banks and such) |
Revision as of 00:51, 17 January 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |