this post was submitted on 17 Jun 2023
2 points (100.0% liked)
Standard Notes
76 readers
1 users here now
Standard Notes
An end-to-end encrypted note-taking app. Available for macOS, Windows, Linux, iOS, Android, and the Web.
https://standardnotes.com โ Not consistently monitored by SN team. (Not Yet Official)
For community help, join our Discord: https://standardnotes.com/discord.
For support from an SN team member, email [email protected].
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Security depends upon who the threat agent is that you are trying to protect against. A common person, an experienced expert/criminal hacker or a nation/state. Given that in theory any nation/state has "potentially unlimited" resources, to the point of there being at least one known case of a cyberattack on an air-gap computer, I would say all bets are off if you are doing something shady enough to attract the attention of the government of a powerful nation such as the USA or UK and be viewed as a potential threat to national security. Beyond that, I'd say within reason most encryption accomplishes its job by at the very least slowing the person down big time and requiring more resources to extract the data than the data is worth.