Viewing a response to: @zoidsoft/why-centralized-it-cannot-be-protected-and-how-decentralization-will-render-these-attacks-obsolete
I have been thinking about getting a pure offline pc as well. When that pc needs new software i can download it on usb stick (or external hdd) and install. Now my question. Do you think I can later format that usb stick and reuse it on an online pc or should it be destroyed? Am I getting paranoid?
author | frdem3dot0 |
---|---|
permlink | re-zoidsoft-why-centralized-it-cannot-be-protected-and-how-decentralization-will-render-these-attacks-obsolete-20180328t071756206z |
category | technology |
json_metadata | {"tags":["technology"],"app":"steemit/0.1"} |
created | 2018-03-28 07:17:57 |
last_update | 2018-03-28 07:18:36 |
depth | 1 |
children | 1 |
last_payout | 2018-04-04 07:17:57 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.116 HBD |
curator_payout_value | 0.021 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 298 |
author_reputation | 5,680,052,681,361 |
root_title | "Why Centralized IT cannot be Protected and how Decentralization will Render these Attacks Obsolete" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 47,044,263 |
net_rshares | 54,648,353,884 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
zoidsoft | 0 | 54,648,353,884 | 100% |
Formatting should erase everything. If you want to be extra careful you can encrypt a USB drive. I start out with a machine that has no significant personal info but connects to the internet which then checks for viruses, trojans, and other malware. Then anything I need from the internet is brought from a USB drive to my unconnected machine. This transfer is always one direction. Never do I transfer anything from the private machine to the internet connected machine. If I have to do the latter, such as passwords, then I write it out on a piece of paper and type it into a masked field. My keystrokes are encrypted using Zemana Antilogger, so this latter method should be safe.
author | zoidsoft |
---|---|
permlink | re-frdem3dot0-re-zoidsoft-why-centralized-it-cannot-be-protected-and-how-decentralization-will-render-these-attacks-obsolete-20180328t074317364z |
category | technology |
json_metadata | {"tags":["technology"],"app":"steemit/0.1"} |
created | 2018-03-28 07:43:18 |
last_update | 2018-03-28 07:43:18 |
depth | 2 |
children | 0 |
last_payout | 2018-04-04 07:43:18 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 689 |
author_reputation | 17,657,439,386,076 |
root_title | "Why Centralized IT cannot be Protected and how Decentralization will Render these Attacks Obsolete" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 47,047,084 |
net_rshares | 3,210,374,603 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
frdem3dot0 | 0 | 3,210,374,603 | 100% |