@wtry@lemm.eecake to Privacy@lemmy.ml • 8 months agoWhat are your preferred methods of file encryption?message-square36fedilinkarrow-up1102arrow-down13file-text
arrow-up199arrow-down1message-squareWhat are your preferred methods of file encryption?@wtry@lemm.eecake to Privacy@lemmy.ml • 8 months agomessage-square36fedilinkfile-text
minus-square@felbane@lemmy.mllinkfedilink5•edit-28 months agoEven more impressive when someone lops his hand off and presents it to the machine and gains access to his multiple gigabytes of Stallman x Jobs fanfic. That implant needs to be the second factor so that the bad guys also need a wrench.
Geez this guy secures. Impressive
Even more impressive when someone lops his hand off and presents it to the machine and gains access to his multiple gigabytes of Stallman x Jobs fanfic.
That implant needs to be the second factor so that the bad guys also need a wrench.