@[email protected] to [email protected]English • 4 months agoWE ARE IMMUNE ‼️lemm.eeimagemessage-square43fedilinkarrow-up1404
arrow-up1404imageWE ARE IMMUNE ‼️lemm.ee@[email protected] to [email protected]English • 4 months agomessage-square43fedilink
minus-square@[email protected]linkfedilinkEnglish14•4 months agoIf they can take my unlocked device by force, they can probably also break my fingers to coerce me to unlock it See also: https://xkcd.com/538/ Randall is right in pointing out you need to consider your attack vectors, but this doesn’t mean you shouldn’t take reasonable precautions Most people are more likely to run into the type of attack OP references than someone who can break LUKS encryption stealing their device
minus-square@[email protected]linkfedilinkEnglish2•4 months agothis is why6 I use LibreWolf set to clear all cookies & history + a password manager :p
Relevant:
If they can take my unlocked device by force, they can probably also break my fingers to coerce me to unlock it See also: https://xkcd.com/538/
Randall is right in pointing out you need to consider your attack vectors, but this doesn’t mean you shouldn’t take reasonable precautions
Most people are more likely to run into the type of attack OP references than someone who can break LUKS encryption stealing their device
this is why6 I use LibreWolf set to clear all cookies & history + a password manager :p
XKCD 1200