• mariusafa@lemmy.sdf.org
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    9 months ago

    Mossad or other agencies arent God. If my device is cryptographically secure and doesn’t have backdoors it’s unfeasible to access any data with current technology. I guess you are right if you take into account Intel management engine and similar, but since I use libreboot bios that does not apply to my computer (only place that I treat as secure).

    If you use Apple, Microsoft, google, etc devices, those are 100% vulnerable even if you use idk rsa 2048 (xd). The problem is who you are trusting.

    That’s a good point. But, yeah again I don’t fall in those categories. I try to ensure that my security is only based and covered behind cryptography theory and nothing else.

    • MetaCubed@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      The point is that if someone really wants to get into your device, they will. It doesn’t matter if youre using open source firmware, in a custom implementation of linux, on a MIPS CPU, and you personally build every package from source and complete a compliance code review before installing it, etc.etc.etc. If government agency x is targeting you specifically, your best line of security is to lock your device in a safe, take a boat into the middle of the ocean, and then dump it at an unrecorded location and never retrieve it.

      A device is only secure as long as you are not using it, and it is not accessible physically, or by network.

      You do you dude, I’m just saying your advice is awful for the average user.