whfsdude@dmv.social to Technology@lemmy.worldEnglish · 1 year agoUbiquiti Users Somehow Being Fed Access to Strangers' Security Cameraswww.404media.coexternal-linkmessage-square37fedilinkarrow-up1246arrow-down12
arrow-up1244arrow-down1external-linkUbiquiti Users Somehow Being Fed Access to Strangers' Security Cameraswww.404media.cowhfsdude@dmv.social to Technology@lemmy.worldEnglish · 1 year agomessage-square37fedilink
minus-squarecubism_pitta@lemmy.worldlinkfedilinkEnglisharrow-up11·1 year agoBest place to start if you’re taking security seriously; Implementing file encryption for example has to start with “I would rather that I myself potentially lose access to this data than for it to possibly fall into another person’s hands.”
Best place to start if you’re taking security seriously; Implementing file encryption for example has to start with “I would rather that I myself potentially lose access to this data than for it to possibly fall into another person’s hands.”