cross-posted from: https://feddit.nl/post/29675306

I am not the author.

I found this blog to have both a short summary of the reasons as well as a pretty complete overview of the options for protecting against this specific threat model. I can just send this to people and they’ll understand the why and the how.

    • F04118F@feddit.nlOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      3 hours ago

      Mostly yes, but there are some closed source services which are still good options for this specific threat model.

      And I just thought the clear explanation of the why combined with the list, makes this an excellent blog to send to people who don’t get it yet.

      The list itself is something most of the people in this community know already, but you might want to send this when someone asks “why?”