Asenna Steam
kirjaudu sisään
|
kieli
简体中文 (yksinkertaistettu kiina)
繁體中文 (perinteinen kiina)
日本語 (japani)
한국어 (korea)
ไทย (thai)
български (bulgaria)
Čeština (tšekki)
Dansk (tanska)
Deutsch (saksa)
English (englanti)
Español – España (espanja – Espanja)
Español – Latinoamérica (espanja – Lat. Am.)
Ελληνικά (kreikka)
Français (ranska)
Italiano (italia)
Bahasa Indonesia (indonesia)
Magyar (unkari)
Nederlands (hollanti)
Norsk (norja)
Polski (puola)
Português (portugali – Portugali)
Português – Brasil (portugali – Brasilia)
Română (romania)
Русский (venäjä)
Svenska (ruotsi)
Türkçe (turkki)
Tiếng Việt (vietnam)
Українська (ukraina)
Ilmoita käännösongelmasta
https://xkcd.com/538/
When your PC is running it doesn't matter how strong the encryption is because they will find a way to exploit you; since you had said good things about Atlas OS remember that to the best of my knowledge removes the antivirus, increasing the ease of malware being an avenue into a running PC.
When law enforcement shows up to seize a running PC they may have a kit like this to keep the PC powered while seizing it: https://wiebetech.com/products/hotplug-field-kit/
When you make misinformed statements about a default Atlas setup, as it is now clear that you are predisposed to do, it really undermines your credibility in whatever valid point you wanted to make.
It really makes you seem like you get all your PC security information from engagement farming Youtubers.
Either way it's still not as safe as LTSC until someone combs over the entire script and actually notes down every little thing it does and confirms that it can actually be trusted to do what it claims. AME Wizard is free software that can be used by anyone with malicious intent, it can even be used to sneak in malicious files into playbooks that steal user data. Compared to vanilla Windows 10 and 11, it's probably still safer, but LTSC is the safest option if you're looking to protect your data as there's no telemetry or even diagnostics data being taken to protect the security of enterprises using it. It's difficult to tell for absolute certain if Atlas actually removes all of the stuff it says it does because Windows is closed source, we don't even know the full extent of everything in there and there could be things left behind that just aren't there at all with the LTSC version which is more secure because it's officially supported but just packaged for enterprise level security.
It might be best to run everything off a USB live disk, and quickly stick it up the butt when the raid happens. They probably won't do a TSA style body scan and cavity search unless it's specified on the warrant, and IDK what investigative procedures would lead to something like that being approved.
Maybe if you're already under surveillance and they read this post, in which case, Hi, guys! I totally stand by the earlier 'pigs' remark, and will continue to do so until Section 702 is abolished, every NSA agent past and present who abused or ignored FISA courts is prosecuted, and the 4th Amendment is restored.
And maybe President Harris establishes the Roy Olmstead Medal of Freedom and welcomes Snowden back as it's first recipient.
Or surely there is a backdoor in your PC or CPU for the feds to have direct access to the TPM.
For regular home pc's? No, the performance hit on R/W is not worth it.
If they cant' brute force it they will either know of backdoors, or work with MS to unlock your data if you're high profile enough.
For office notebook's & pc's it's basically a given, considering the loss of data & budgets are way way higher.
Don't bother with Bitlocker, just backup your most important data either on a external HDD or a NAS.
If you want to keep something secret, it's quite simple: never store it on a device that connects to the internet. That's the first and easiest step to keep what you want hidden, hidden.
Even if you use filesystem encryption, certain exploits that exist and will exist in the future will allow your data to be compromised. As long as your computer is running and you can read the data, so can anyone else that can access the computer remotely.
Digital data is not secure unless it is inaccessible to both the bad actor and the user at the time of the attack
Don't underestimate how well a hammer to the kneecaps work if you don't feel like giving your password up either. They have ways ...
https://www.youtube.com/watch?v=FaFGReW3wBA
Yes of course...
https://www.youtube.com/watch?v=OBOZIErHhWM