Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Kudos to this article for:

1. starting with threat modeling (though they don't call it that);

2. mentioning that your OPSEC affects not only you but also people connected to you; and

3. mentioning that maybe you should just leave the device at home (because it's basically a surveillance machine that you pay for).

(A more common article format would be to unload a pile of supposed security&privacy measures without putting them into context, and wouldn't properly set expectations for what that gives you. Neither of which is very helpful, and can be very counterproductive.)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: