Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
learn [2015/09/28 13:37] – 127.0.0.1 | learn [2020/08/08 17:45] – old revision restored (2015/11/26 13:08) 127.0.0.1 | ||
---|---|---|---|
Line 5: | Line 5: | ||
* [[: | * [[: | ||
* [[: | * [[: | ||
- | * [[learn: | + | * [[:learn: |
You might worry, "how much detail do I need to understand about the crypto tools I will use?" | You might worry, "how much detail do I need to understand about the crypto tools I will use?" | ||
Line 16: | Line 16: | ||
* I want to be complety protected and I want to learn everything! [[learn: | * I want to be complety protected and I want to learn everything! [[learn: | ||
- | * Also if you are e.g. a journalist, a lawyer or you have something else important to do in mind: You might need to protect yourself as well as your clients, sources, and colleagues? You might want to start with the [[: | + | * Also if you are e.g. a journalist, a lawyer or you have something else important to do in mind: You might need to protect yourself as well as your clients, sources, and colleagues? You might want to start with the [[: |
Either way, it is easy and (with the right amount of motivation) certainly do-able, but the [[: | Either way, it is easy and (with the right amount of motivation) certainly do-able, but the [[: | ||
Line 25: | Line 25: | ||
If your operating system is backdoored, your cryptosoftware is backdoored, too. | If your operating system is backdoored, your cryptosoftware is backdoored, too. | ||
- |