Skip Navigation

Posts
7
Comments
12
Joined
2 yr. ago

  • After thorough discussion with Oliver's PR team, it has been concluded that he is so beautiful his every appearance is a debut.

    Hope this clears it up!

  • My, oh, my. What a nice feature.

  • I clocked that right after I posted. Knew it was just a matter of time before someone commented this.

  • cats @lemmy.world

    Oliver's debut on Lemmy

  • Rule

    Jump
  • This is a smear campaign! Poob is the best streaming provider, nobody can convince me otherwise.

  • Honestly, I'll take anything over those outsourced call centers at this point. Half of those representatives barely speak English.

  • Community Promo @lemmy.ca

    Operations Security (OPSEC) - A space dedicated to discussing, sharing, and learning about operational security practice

  • New Communities @lemmy.world

    Operations Security (OPSEC) - A space dedicated to discussing, sharing, and learning about operational security practice

  • No, it should delete all system files. Those people don't deserve a computer.

  • Operations Security (OPSEC) @lemmy.zip

    Friendly reminder to be careful about what you say (especially online). Loose lips sink ships.

  • "Cave Johnson, we're done here."

  • Title

    Jump
  • You can always forcefully shut it down while it's rebooting.

  • This is quite extreme. While it could be beneficial for some threat models, this was written as an example for the average Joe. OPSEC is not about having the best possible security as much as it is about having security that satisfies your threat model.

  • Operations Security (OPSEC) @lemmy.zip

    Locking the window won't help if the door is wide open. In OPSEC, always start with the basics, and only after should you move on to the little things.

  • It is unfortunately impossible to defend against time. What works today might not work tomorrow, but that doesn't mean you should give up because it might get compromised at some point in time. Establishing a clear threat model helps push that point in time farther away.

  • The backlash is extremely idiotic. The only two options are to store it in plaintext or to have the user enter the decryption key every time they open it. They opted for the more user-friendly option, and that is perfectly okay.

    If you are worried about an outsider extracting it from your computer, then just use full disk encryption. If you are worried about malware, they can just keylog you when you enter the decryption key anyways.

  • Privacy @lemmy.ml

    Threat Modelling 101

  • Operations Security (OPSEC) @lemmy.zip

    Threat Modelling 101