cross-posted from: feddit.nl/post/29675306
I am not the author.
I found this blog to have both a short summary of the reasons as well as a pretty complete overview of the options for protecting against this specific threat model. I can just send this to people and they’ll understand the why and the how.
t3rmit3@beehaw.org 4 weeks ago
No notes!
01189998819991197253@infosec.pub 4 weeks ago
Made me think of this scene lol
Image