0 comments
Comments sorted by top scores.
comment by agai · 2019-12-26T12:28:38.385Z · LW(p) · GW(p)
Comment removed for posterity.
Replies from: Viliam, jimrandomh, TAG, Pattern↑ comment by jimrandomh · 2019-12-31T22:44:55.454Z · LW(p) · GW(p)
I reason (as is standard) that the only real way that my machine would be compromised is if someone has physical access; and if that's the case there's absolutely nothing you can do about it.
This is incorrect. The main ways computers get compromised are as part of broadly-targeted attacks using open ports, trojanized downloads, and vulnerabilities in the web browser, email client and other network-facing software. For physical-access attacks, the main one is that the computer gets physically stolen, powered off in the process, and never returned, in which case having encrypted the hard disk matters a lot.
↑ comment by Pattern · 2019-12-30T23:30:24.535Z · LW(p) · GW(p)
Urbit (https://urbit.live/) [? · GW] is in fact the future of computing.
This link seems to be broken.
under $20USD,*
Is this a reference to a missing footnote?