@@ -75,7 +75,7 @@ The times at which the main cron tasks run are randomized for each install of th
** Protection of data at rest
Currently full disk encryption is not enabled and this is a deliberate security tradeoff. Full disk encryption only protects data when the system is powered off and this system is intended to run continuously. If your server is obtained by an adversary then they may be able to read any data stored on it. This may be partly mitigated due to logging being turned off and there being no logged IP addresses.
Full disk encryption requires authentication on boot and this system is intended to be operational even in the presence of occasional electrical power cuts. The small benefit which it would provide it greatly outweighed by the advantages of being able to maintain a continuous internet presence despite some levek of unreliability of the surrounding infrastructure.
Full disk encryption requires authentication on boot and this system is intended to be operational even in the presence of occasional electrical power cuts. The small benefit which it would provide it greatly outweighed by the advantages of being able to maintain a continuous internet presence despite some level of unreliability of the surrounding infrastructure.
** Insufficient entropy
Entropy level is checked before the creation of new passwords.
@@ -375,7 +375,7 @@ Currently full disk encryption is not enabled and this is a deliberate security
</p>
<p>
Full disk encryption requires authentication on boot and this system is intended to be operational even in the presence of occasional electrical power cuts. The small benefit which it would provide it greatly outweighed by the advantages of being able to maintain a continuous internet presence despite some levek of unreliability of the surrounding infrastructure.
Full disk encryption requires authentication on boot and this system is intended to be operational even in the presence of occasional electrical power cuts. The small benefit which it would provide it greatly outweighed by the advantages of being able to maintain a continuous internet presence despite some level of unreliability of the surrounding infrastructure.