Why a security category
I do almost everything on line, and use passwords and keys to protect assets I need to access. I have grown fully dependant on technology to live my life.
Because I am the one in control of the security provisons of my own computer, and of its degree of exposure to viruses and similar kinds of threats, I prefer to use my own laptop for such things. To avoid ever using alien equipment for important transactions.
Although there are many people I fully trust, I can trust them, but I cannot usually trust their methods.
I worry the possible loss or theft or compromiseof my computer and more so when I travel.
Suppose my laptop is stolen when I travel.
- How do I preserve and recover the collection of passwords I use to access secured online accounts such as bank accounts. How is their privacy protected.
- How do I preserve the state of work in progress of whatever projects I am maintaining using this device. Any of that work which may contain sensitive private information needs to be safe.
- How to protect my online identity. This entails, revoking compromised keys such as GPG keys, and SSH keys.
This blog category is where I try to pose and answer such questions.