Security notes - security for the everyday person: Difference between revisions
Jump to navigation
Jump to search
Line 90: | Line 90: | ||
What makes more-mobile devices special is that they physically are ''usually'' in environments you can't trust, | |||
and unlike most other kinds of devices, not doing that ''defeats their point''. | |||
Data-at-rest encryption is arguably largely about "what happens when the people steal the storage and/or device that contains it?" | |||
After it's stolen and it's still on, this encryption does not yet play a role. | After it's stolen and it's still on, this encryption does not yet play a role. |
Revision as of 16:39, 8 April 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |