Security notes - security for the everyday person: Difference between revisions

From Helpful
Jump to navigation Jump to search
Line 255: Line 255:




Depends on '''what problem are you trying to solve'''.
 
Depends.
 
Let's do some threat modeling, a.k.a. figuring out '''what problem you are trying to solve'''.


Because if it solves problems you didn't have in the first place,
Because if it solves problems you didn't have in the first place,
based on "overheard in public", and [[fud|fear, uncertainy, and doubt]],
based on "overheard in public", and [[fud|fear, uncertainty, and doubt]],
then you bought one based on a sales pitch.
then you bought one based on a sales pitch.


Line 283: Line 286:


* Defeating the fact that some sources of internet will snoop on your traffic, be it your ISP or public WiFi.
* Defeating the fact that some sources of internet will snoop on your traffic, be it your ISP or public WiFi.
: this can be overstated, because in many countryies such snooping is illegal -- but that doesn't mean they don't, and it may not apply to your country
: this can be overstated, because in many countries such snooping is illegal -- but that doesn't mean they don't, and it may not apply to your country
: so it's partly overplayed marketing [[fud]], partly not
: so it's partly overplayed marketing [[fud]], partly not
:: Redundant in that: the network can't snoop on the contents of HTTPS website traffic, which is now common on everything (and always was on important sites like banks and such)
:: Redundant in that: the network can't snoop on the contents of HTTPS website traffic, which is now common on everything (and always was on important sites like banks and such)

Revision as of 00:51, 17 January 2024

Security related stuff.


Linux - PAM notes · SELinux

Securing services


A little more practical


More techincal waffling

Message signing notes · Hashing notes ·
Auth - identity and auth notes
Encryption - Encryption notes · public key encryption notes · data-at-rest encryption ·pre-boot authentication · encrypted connections

Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted

Is it important to use antivirus/malware protection?

Is it important to encrypt my PC?

Is it important to encrypt my laptop or phone?

Is it important to use a password manager?

Is it important to use a VPN?

Is it important to use secure mail?

So these messenging apps are the end-all then?