diff options
author | Francis Rowe <info@gluglug.org.uk> | 2014-11-11 03:42:08 +0000 |
---|---|---|
committer | Francis Rowe <info@gluglug.org.uk> | 2014-11-11 03:42:08 +0000 |
commit | 1fe77a920b952fe1cf997c72a0407384e767a039 (patch) | |
tree | 66121901a6aacf75c97ca55a7598d039c5198fa0 | |
parent | 0ac242578e955215ad29199cda418d2329940a7a (diff) |
docs/security/t60_security.html Shorten description
docs/security/x60_security.html Shorten description
-rw-r--r-- | docs/security/t60_security.html | 20 | ||||
-rw-r--r-- | docs/security/x60_security.html | 20 |
2 files changed, 4 insertions, 36 deletions
diff --git a/docs/security/t60_security.html b/docs/security/t60_security.html index eb3db03..5fc96c1 100644 --- a/docs/security/t60_security.html +++ b/docs/security/t60_security.html @@ -45,28 +45,12 @@ </h1> <p> Most people think of security on the software side: the hardware is important aswell. - Hardware security is useful in particular to journalists (or activists in a given movement) who need absolute privacy in their work. - It is also generally useful to all those that believe security and privacy are inalienable rights. - Security starts with the hardware; crypto and network security come later. - </p> - <p> - Paradoxically, going this far to increase your security also makes you a bigger target. - At the same time, it protects you in the case that someone does attack your machine. - This paradox only exists while few people take adequate steps to protect yourself: it is your <b>duty</b> - to protect yourself, not only for your benefit but to make strong security <i>normal</i> so - that those who do need protection (and claim it) are a smaller target against the masses. - </p> - <p> - Even if there are levels of security beyond your ability (technically, financially and so on) - doing at least <i>something</i> (what you are able to do) is extremely important. - If you use the internet and your computer without protection, attacking you is cheap (some say it is - only a few US cents). If everyone (majority of people) use strong security by default, - it makes attacks more costly and time consuming; in effect, making them disappear. + work. </p> <p> This tutorial deals with reducing the number of devices that have direct memory access that could communicate with inputs/outputs that could be used to remotely - command the machine (or leak data). + command the machine (or leak data). All of this is purely theoretical for the time being. </p> <h1 id="procedure">Disassembly</h1> diff --git a/docs/security/x60_security.html b/docs/security/x60_security.html index 33ccb6d..515c8fc 100644 --- a/docs/security/x60_security.html +++ b/docs/security/x60_security.html @@ -45,28 +45,12 @@ </h1> <p> Most people think of security on the software side: the hardware is important aswell. - Hardware security is useful in particular to journalists (or activists in a given movement) who need absolute privacy in their work. - It is also generally useful to all those that believe security and privacy are inalienable rights. - Security starts with the hardware; crypto and network security come later. - </p> - <p> - Paradoxically, going this far to increase your security also makes you a bigger target. - At the same time, it protects you in the case that someone does attack your machine. - This paradox only exists while few people take adequate steps to protect yourself: it is your <b>duty</b> - to protect yourself, not only for your benefit but to make strong security <i>normal</i> so - that those who do need protection (and claim it) are a smaller target against the masses. - </p> - <p> - Even if there are levels of security beyond your ability (technically, financially and so on) - doing at least <i>something</i> (what you are able to do) is extremely important. - If you use the internet and your computer without protection, attacking you is cheap (some say it is - only a few US cents). If everyone (majority of people) use strong security by default, - it makes attacks more costly and time consuming; in effect, making them disappear. + work. </p> <p> This tutorial deals with reducing the number of devices that have direct memory access that could communicate with inputs/outputs that could be used to remotely - command the machine (or leak data). + command the machine (or leak data). All of this is purely theoretical for the time being. </p> <h1 id="procedure">Disassembly</h1> |