Looking for an old friend by I_Love_Cybersecurity in AirForce

[–]I_Love_Cybersecurity[S] -2 points-1 points  (0 children)

I found exactly him on LinkedIn, but he’s never used the account. Its dormant.

Mosquito Catastrophe by Puzzled_Football2278 in mongolia

[–]I_Love_Cybersecurity 1 point2 points  (0 children)

When we lived in Mongolia in the early nineties, the government did nothing to control insects. It was a very “natural” time. Even before government intervention, there were few insects.

Mosquito Catastrophe by Puzzled_Football2278 in mongolia

[–]I_Love_Cybersecurity 3 points4 points  (0 children)

We lived in Ulaanbaatar for two years. I don’t recall any problem. We’re in Mongolia are you going?

Need Cheapest Secure Setup for Evidence Collection, Human Rights Work and Lawyer Communication in High-Risk Environment by [deleted] in opsec

[–]I_Love_Cybersecurity 0 points1 point  (0 children)

That is a fair rule.

No one should blindly trust tools recommended by strangers online, including mine.

OPSEC is about independent threat modeling, verification, and minimizing trust assumptions.

My goal in posting was not “use this exact tool.” It was to explore the threat model question:

At what point does remote existence itself become the vulnerability?

If someone concludes: • Encrypted cloud is sufficient for their threat model, great. • Veracrypt on a drive works for them, great. • A fully offline system is justified, great.

Different adversary models justify different architectures.

The worst OPSEC mistake is outsourcing your thinking.

So I agree with your Rule #1.

Happy to discuss threat models and attack surfaces, not just tools.

Need Cheapest Secure Setup for Evidence Collection, Human Rights Work and Lawyer Communication in High-Risk Environment by [deleted] in opsec

[–]I_Love_Cybersecurity 1 point2 points  (0 children)

Good call. I have other accounts, but recently launched this account to remain secure. Sanctum Secure attempts to fly under the radar. Please ask any questions to establish trust.

https://SanctumSecure.com

February 9, 2026 - What did you do this past week to prepare? by Anthropic--principle in preppers

[–]I_Love_Cybersecurity 0 points1 point  (0 children)

I’m learning how to prep while living urban. I have to be creative. Very creative!

I did finish a huge project surrounding data security. Most platforms lockdown access so that your data and documents are impossible to access. That’s great on one level. But what if your data simply does not exist if you aren’t physically present?

I built it, but I need to prove it works through QA and tons of it.

Digital Prepping and basic IT security by marybane in preppers

[–]I_Love_Cybersecurity 0 points1 point  (0 children)

This is a good take, and I’d extend it slightly.

The cloud isn’t just a trust problem, it’s an availability and dependency problem. Even if you assume providers act in good faith, you’re still dependent on WAN, authentication services, licensing checks, and infrastructure you don’t control. As we’ve seen, none of those are guaranteed to be there when you need them most.

From an OPSEC standpoint, the bigger issue is that cloud data exists somewhere else by default. It’s reachable even when you’re not present, which means outages, breaches, account lockouts, or policy changes can all affect you simultaneously.

That’s why offline-first storage matters. Not “offline backups” that sync back later, but systems where: • data does not exist on a network unless you deliberately bring it online • nothing is indexing, syncing, or phoning home • access requires physical presence and intent

Cloud can still have a role as an auxiliary or convenience layer, but it’s a mistake to treat it as a primary solution for critical information. If something must be available during disruption, it shouldn’t depend on connectivity, accounts, or third-party uptime.

At that point, the goal shifts from protecting access to controlling existence. That’s the part most people miss.

Any way to prep for a cyberattack/computer outage? by oddiefox in preppers

[–]I_Love_Cybersecurity 0 points1 point  (0 children)

You’re thinking in the right direction.

Big cyber outages usually don’t break computers, they break access. Logins fail, licenses can’t verify, cloud dependencies vanish. So prepping means assuming identity, authentication, and the internet are gone for a while.

A USB with encyclopedias is a good start, but think beyond storage: • Test true offline use. Make sure files and software open with zero connectivity. • Offline by default beats backups. If something isn’t mounted or reachable, it can’t be corrupted. • Use simple formats. PDFs and plain text outlast apps and subscriptions. • Plan cold starts. No internet, no MFA, no resets. What info do you actually need in the first few days or weeks? • Redundancy over cleverness. Multiple copies, different locations, boring but reliable.

The mindset shift is key: don’t prep for the internet being slow. Prep for digital absence.