The world awaits...

secure computing (6)

Time for a Personal Cloud

The Apple CSAM scanning highlights something many know but shrugged off, your data in the cloud is yours, and the providers. Unless you take strong measures to combat it, your data is yours and theirs.

Continue reading...

How I Store Files in a Cloud

Background In discussions with someone about cloud security, they were surprised to learn I store anything in the cloud. It's convenient to have my files synced between machines. I use syncthing, resilio, and cloud drives.

Continue reading...

Thinking about Secure Computing

What do you think about when you hear "secure computing"? You could think about access controls (username/password, two factor authentication, etc), encryption (of data at rest, data in transit), air-gapped networks, physical security of the…

Continue reading...