whfsdude@dmv.social to Technology@lemmy.worldEnglish · 2 years agoUbiquiti Users Somehow Being Fed Access to Strangers' Security Cameraswww.404media.coexternal-linkmessage-square35linkfedilinkarrow-up1233arrow-down13
arrow-up1230arrow-down1external-linkUbiquiti Users Somehow Being Fed Access to Strangers' Security Cameraswww.404media.cowhfsdude@dmv.social to Technology@lemmy.worldEnglish · 2 years agomessage-square35linkfedilink
minus-squarecubism_pitta@lemmy.worldlinkfedilinkEnglisharrow-up11·2 years agoBest place to start if you’re taking security seriously; Implementing file encryption for example has to start with “I would rather that I myself potentially lose access to this data than for it to possibly fall into another person’s hands.”
Best place to start if you’re taking security seriously; Implementing file encryption for example has to start with “I would rather that I myself potentially lose access to this data than for it to possibly fall into another person’s hands.”