If I come back and continue to use my compromised computer, the attacker could gain access to everything.Įdward Snowden and his friends have a solution. My disk is encrypted, but all it takes to bypass this protection is for an attacker - a malicious hotel housekeeper, or “ evil maid,” for example - to spend a few minutes physically tampering with it without my knowledge. It contains sensitive information messaging app conversations, email, password databases, encryption keys, unreleased work, web browsers logged into various accounts, and so on. Like many other journalists, activists, and software developers I know, I carry my laptop everywhere while I’m traveling.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |