From 6f9b8271aa8a839b480a01699760efa95bd57441 Mon Sep 17 00:00:00 2001 From: DarkFeather Date: Thu, 17 Feb 2022 10:46:52 -0600 Subject: [PATCH] Changing TODO into link --- Articles/The_Complicated_Cloud.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Articles/The_Complicated_Cloud.md b/Articles/The_Complicated_Cloud.md index 78a2a05..035733b 100644 --- a/Articles/The_Complicated_Cloud.md +++ b/Articles/The_Complicated_Cloud.md @@ -12,7 +12,7 @@ Unknown Datacenter ``` -There's a reason why persons like Edward Snowden use strong personally-encrypted devices to hold their data -- once someone gets physical access to hardware, hardware attacks like cable taps, drive cloning, [microphone-based PGP decryption](TODO), etc. can invalidate a lot of technical protections. FISA warrants and National Security Letters may allow government bodies to effect this exploits on your hardware without your knowledge, even when you may not be the intended target, and organizations the size of the AniNIX will not drive any protest from the hosting companies. Without blockchain-style validation & encryption of data (which is presently infeasible for services like AniNIX/Yggdrasil or other media platforms), this brings a lot of insecurity. +There's a reason why persons like Edward Snowden use strong personally-encrypted devices to hold their data -- once someone gets physical access to hardware, hardware attacks like cable taps, drive cloning, [microphone-based PGP decryption](https://www.welivesecurity.com/2015/06/23/pgp-encryption-keys-pita/), etc. can invalidate a lot of technical protections. FISA warrants and National Security Letters may allow government bodies to effect this exploits on your hardware without your knowledge, even when you may not be the intended target, and organizations the size of the AniNIX will not drive any protest from the hosting companies. Without blockchain-style validation & encryption of data (which is presently infeasible for services like AniNIX/Yggdrasil or other media platforms), this brings a lot of insecurity. We prefer to protect our users and services directly, from the physical layer up, so that we can ensure the best experience and best security possible. We know all actions at all layers and have the ability to inspect those layers at all times.