whfsdude@dmv.social to Technology@lemmy.worldEnglish · 11 months agoUbiquiti Users Somehow Being Fed Access to Strangers' Security Cameraswww.404media.coexternal-linkmessage-square35fedilinkarrow-up1234arrow-down12
arrow-up1232arrow-down1external-linkUbiquiti Users Somehow Being Fed Access to Strangers' Security Cameraswww.404media.cowhfsdude@dmv.social to Technology@lemmy.worldEnglish · 11 months agomessage-square35fedilink
minus-squarecubism_pitta@lemmy.worldlinkfedilinkEnglisharrow-up10·11 months agoBest place to start if you’re taking security seriously; Implementing file encryption for example has to start with “I would rather that I myself potentially lose access to this data than for it to possibly fall into another person’s hands.”
Best place to start if you’re taking security seriously; Implementing file encryption for example has to start with “I would rather that I myself potentially lose access to this data than for it to possibly fall into another person’s hands.”