wtry@lemm.ee to Privacy@lemmy.ml · 1 year agoWhat are your preferred methods of file encryption?message-squaremessage-square36fedilinkarrow-up1103arrow-down13file-text
arrow-up1100arrow-down1message-squareWhat are your preferred methods of file encryption?wtry@lemm.ee to Privacy@lemmy.ml · 1 year agomessage-square36fedilinkfile-text
minus-squaretwo_wheel2@lemm.eelinkfedilinkEnglisharrow-up4·1 year agoGeez this guy secures. Impressive
minus-squarefelbane@lemmy.mllinkfedilinkarrow-up5·edit-21 year agoEven more impressive when someone lops his hand off and presents it to the machine and gains access to his multiple gigabytes of Stallman x Jobs fanfic. That implant needs to be the second factor so that the bad guys also need a wrench.
Geez this guy secures. Impressive
Even more impressive when someone lops his hand off and presents it to the machine and gains access to his multiple gigabytes of Stallman x Jobs fanfic.
That implant needs to be the second factor so that the bad guys also need a wrench.