Security notes - security for the everyday person: Difference between revisions
Jump to navigation
Jump to search
Line 66: | Line 66: | ||
tl;dr: | tl;dr: | ||
* if you think you'll lose it, and want to ensure that the next reboot people will have a ''hard'' time getting in, yes. | |||
* do not assume encrypted devices do much against law enforcement, | |||
:: in that in a lot of places, you are more or less ''required'' to give them access somehow, and your refusal will have implications | :: in that in a lot of places, you are more or less ''required'' to give them access somehow, and your refusal will have implications | ||
What makes more-mobile devices special is that they physically are ''usually'' in environments you can't trust | What makes more-mobile devices special compared to most others | ||
and unlike most other kinds of devices, not | is that they physically are ''usually'' in environments you can't trust | ||
{{comment|(and unlike most other kinds of devices, not taking them there ''defeats their point'' so people just ''will do that'')}}. | |||
Revision as of 11:23, 13 April 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |