sunnie to Programmer [email protected] • 1 year agoIn case of cyberattacksopuli.xyzimagemessage-square42fedilinkarrow-up1799arrow-down111
arrow-up1788arrow-down1imageIn case of cyberattacksopuli.xyzsunnie to Programmer [email protected] • 1 year agomessage-square42fedilink
minus-square@[email protected]linkfedilink2•1 year agoDon’t tell me you’d try to continue using the compromised systems if you somehow aborted the drive encryption process
minus-square@[email protected]linkfedilink1•1 year agoLikely not, but definitely depends on the situation. And how do you know the backup is not compromised? I think it’s not as clear cut. It’s always a risk assessment and depends on context. I have to say that I’m not a security expert, just an amateur with conceptual understanding of the topic and some opinions.
Don’t tell me you’d try to continue using the compromised systems if you somehow aborted the drive encryption process
Likely not, but definitely depends on the situation.
And how do you know the backup is not compromised?
I think it’s not as clear cut. It’s always a risk assessment and depends on context.
I have to say that I’m not a security expert, just an amateur with conceptual understanding of the topic and some opinions.