• 0 Posts
  • 9 Comments
Joined 3 years ago
cake
Cake day: August 16th, 2023

help-circle
  • Not all of us will do it to the same degree though. IT security has always been a sliding scale between security and convenience. The most secure data is stored in a locked safe without being turned on or connected to anything. That’s not very practical, so we make concessions based on how often we need such data and other convenience metrics.

    I’m not as paranoid as the OP, though I agree with some of the stuff said. Reasonable security measures are fine; you don’t need to look like a digital version of a prepper with a bunker, for most people.

    Edit: for instance I don’t use my TV all that much, but it is a “smart” TV, meaning it has apps that connect to Internet, and I have some online libraries.








  • The purpose of these questions people ask conspiratorially is not to get answers. It’s to foment doubt. They don’t want answers; if they did they could look it up and find an answer. They just want people to start questioning the official story, then they sell their own conspiracy to them. It’s an old playbook, and people like Alex Jones have been using it for decades.


  • CGPGray mentions this in his older video about encryption. Locks are a deterrent, but a motivated person or government forces can bypass relatively easy. The reason it works is because of the personal danger to people trying to break in getting caught. He used it to contrast how digital locks need to be much stronger since they can be “picked” from across the world without any physical danger of being caught or arrested.