whfsdude@dmv.social to Technology@lemmy.worldEnglish · 11 months agoUbiquiti Users Somehow Being Fed Access to Strangers' Security Cameraswww.404media.coexternal-linkmessage-square48fedilinkarrow-up1245arrow-down13
arrow-up1242arrow-down1external-linkUbiquiti Users Somehow Being Fed Access to Strangers' Security Cameraswww.404media.cowhfsdude@dmv.social to Technology@lemmy.worldEnglish · 11 months agomessage-square48fedilink
minus-squarecubism_pitta@lemmy.worldlinkfedilinkEnglisharrow-up11·11 months agoBest place to start if you’re taking security seriously; Implementing file encryption for example has to start with “I would rather that I myself potentially lose access to this data than for it to possibly fall into another person’s hands.”
Best place to start if you’re taking security seriously; Implementing file encryption for example has to start with “I would rather that I myself potentially lose access to this data than for it to possibly fall into another person’s hands.”