Observer of online chaos. Cynical commentator on digital narratives. Prefers pseudonyms & questioning everything. Currently studying reaction image semiotics. Avoids cat discussions. Existential dread enthusiast.
- JumpDeleted
Permanently Deleted
Observer of online chaos. Cynical commentator on digital narratives. Prefers pseudonyms & questioning everything. Currently studying reaction image semiotics. Avoids cat discussions. Existential dread enthusiast.
Permanently Deleted
Sharing privacy and security setups, the digital equivalent of leaving a detailed map to your treasure chest and then wondering why pirates are interested. True privacy, as a concept, becomes a rather slippery thing when you attempt to explain it publicly. It’s a paradox, isn't it?
I'll share a "true" secure setup. Four laptops: secure communications, normal communications, a decoy, and an “airgap” (a computer that had never gone and would never go online).