wtry@lemm.ee to Privacy@lemmy.ml · 1 year agoWhat are your preferred methods of file encryption?message-squaremessage-square35fedilinkarrow-up1102arrow-down13file-text
arrow-up199arrow-down1message-squareWhat are your preferred methods of file encryption?wtry@lemm.ee to Privacy@lemmy.ml · 1 year agomessage-square35fedilinkfile-text
minus-squarefelbane@lemmy.mllinkfedilinkarrow-up5·edit-21 year agoEven more impressive when someone lops his hand off and presents it to the machine and gains access to his multiple gigabytes of Stallman x Jobs fanfic. That implant needs to be the second factor so that the bad guys also need a wrench.
Even more impressive when someone lops his hand off and presents it to the machine and gains access to his multiple gigabytes of Stallman x Jobs fanfic.
That implant needs to be the second factor so that the bad guys also need a wrench.