sunnie to Programmer Humor@lemmy.ml · 1 year agoIn case of cyberattackimagemessage-square42fedilinkarrow-up1822arrow-down111
arrow-up1811arrow-down1imageIn case of cyberattacksunnie to Programmer Humor@lemmy.ml · 1 year agomessage-square42fedilink
minus-squareryannathans@aussie.zonelinkfedilinkarrow-up2·1 year agoDon’t tell me you’d try to continue using the compromised systems if you somehow aborted the drive encryption process
minus-squareblabber6285linkfedilinkarrow-up1·1 year agoLikely not, but definitely depends on the situation. And how do you know the backup is not compromised? I think it’s not as clear cut. It’s always a risk assessment and depends on context. I have to say that I’m not a security expert, just an amateur with conceptual understanding of the topic and some opinions.
Don’t tell me you’d try to continue using the compromised systems if you somehow aborted the drive encryption process
Likely not, but definitely depends on the situation.
And how do you know the backup is not compromised?
I think it’s not as clear cut. It’s always a risk assessment and depends on context.
I have to say that I’m not a security expert, just an amateur with conceptual understanding of the topic and some opinions.