Comment on Follow-up question to mounting encrypted drives
brygphilomena@lemmy.world 10 months ago
Honestly, I am just so curious about your threat model that you are considering this for self hosting.
Comment on Follow-up question to mounting encrypted drives
brygphilomena@lemmy.world 10 months ago
Honestly, I am just so curious about your threat model that you are considering this for self hosting.
MigratingtoLemmy@lemmy.world 10 months ago
What do you mean?
gloriousspearfish@feddit.dk 10 months ago
What he means is, your security considerations here must come from some perceived threat. What kind of threat do you forsee that requires this high level of security?
Usually when you consider security you start with a treat model, describing the scenarios you want to protect your systems from. And based on that you decide the necessary technical security measures that are relevant.