• 9 Posts
  • 100 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle





  • scrutinize the protocol beforehand.

    Sorry but that buys into the data miners’ self serving myths. It implies the protocol is ok unless some failure makes it leak more information than was intended. In fact it’s invasive even if it works exactly as hoped. “Tracking” is a misnomer too. It’s hostile surveillance even if it’s at population level. (Any nonconsensual surveillance that produces info to be used by people you don’t like is hostile by definition. And it’s near guaranteed that some of the buyers-advertisers, political campaigns and funders, govt agencies, whatever-will be people you don’t like). So shut it down.
















  • If this is for live disks or mirrors (not backup), LUKS is reasonable. Backup is different from mirroring since one of the things it protects you from is accidentally deleting files. If you delete a file from your main drive, it also disappears from the mirror drive, so mirrors are not backup. For encrypted backup, I’ve been using Borg backup which is quite well thought out, though confusing at first. The backups go on a remote server which is ok since they are all encrypted.