Comment on Follow-up question to mounting encrypted drives
brygphilomena@lemmy.world 1 year ago
Honestly, I am just so curious about your threat model that you are considering this for self hosting.
Comment on Follow-up question to mounting encrypted drives
brygphilomena@lemmy.world 1 year ago
Honestly, I am just so curious about your threat model that you are considering this for self hosting.
MigratingtoLemmy@lemmy.world 1 year ago
What do you mean?
gloriousspearfish@feddit.dk 1 year ago
What he means is, your security considerations here must come from some perceived threat. What kind of threat do you forsee that requires this high level of security?
Usually when you consider security you start with a treat model, describing the scenarios you want to protect your systems from. And based on that you decide the necessary technical security measures that are relevant.