create account

RE: Why Centralized IT cannot be Protected and how Decentralization will Render these Attacks Obsolete by frdem3dot0

View this thread on: hive.blogpeakd.comecency.com

Viewing a response to: @zoidsoft/why-centralized-it-cannot-be-protected-and-how-decentralization-will-render-these-attacks-obsolete

· @frdem3dot0 · (edited)
$0.14
I have been thinking about getting a pure offline pc as well. When that pc needs new software i can download it on usb stick (or external hdd) and install. Now my question. Do you think I can later format that usb stick and reuse it on an online pc or should it be destroyed? Am I getting paranoid?
👍  
properties (23)
authorfrdem3dot0
permlinkre-zoidsoft-why-centralized-it-cannot-be-protected-and-how-decentralization-will-render-these-attacks-obsolete-20180328t071756206z
categorytechnology
json_metadata{"tags":["technology"],"app":"steemit/0.1"}
created2018-03-28 07:17:57
last_update2018-03-28 07:18:36
depth1
children1
last_payout2018-04-04 07:17:57
cashout_time1969-12-31 23:59:59
total_payout_value0.116 HBD
curator_payout_value0.021 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length298
author_reputation5,680,052,681,361
root_title"Why Centralized IT cannot be Protected and how Decentralization will Render these Attacks Obsolete"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id47,044,263
net_rshares54,648,353,884
author_curate_reward""
vote details (1)
@zoidsoft ·
Formatting should erase everything.  If you want to be extra careful you can encrypt a USB drive.  I start out with a machine that has no significant personal info but connects to the internet which then checks for viruses, trojans, and other malware.  Then anything I need from the internet is brought from a USB drive to my unconnected machine.  This transfer is always one direction.  Never do I transfer anything from the private machine to the internet connected machine.  If I have to do the latter, such as passwords, then I write it out on a piece of paper and type it into a masked field.  My keystrokes are encrypted using Zemana Antilogger, so this latter method should be safe.
👍  
properties (23)
authorzoidsoft
permlinkre-frdem3dot0-re-zoidsoft-why-centralized-it-cannot-be-protected-and-how-decentralization-will-render-these-attacks-obsolete-20180328t074317364z
categorytechnology
json_metadata{"tags":["technology"],"app":"steemit/0.1"}
created2018-03-28 07:43:18
last_update2018-03-28 07:43:18
depth2
children0
last_payout2018-04-04 07:43:18
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length689
author_reputation17,657,439,386,076
root_title"Why Centralized IT cannot be Protected and how Decentralization will Render these Attacks Obsolete"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id47,047,084
net_rshares3,210,374,603
author_curate_reward""
vote details (1)