← Back to context

Comment by 542354234235

2 days ago

Split up your information so a compromise of any one system does not compromise everything you are working on. For instance, storing contact information on a source on a separate device from any/all information provided by that source. If system A is compromised, they know you contact someone at 123-456-7890 but know not much else. If system B is compromised, they know someone is providing information on corruption within Wakanda’s government, but have no identifying information.

Trying to get into multiple systems and corollate/reconstruct information is much more difficult, time consuming, and likely to be much less complete. If a state actor has decided to stop at nothing to get you, it probably wont help, but if you are just someone that could end up on someone’s list, it will likely help.