this post was submitted on 29 Dec 2023
33 points (100.0% liked)
Arch Linux
7750 readers
2 users here now
The beloved lightweight distro
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
But that's the nature of the beast. Unless one defines their threat model^[1]^, there's an ever-expanding list of improvements one might apply to enhance security; with -at some point- (mostly) diminishing returns and we've yet to talk about the amount of comfort that's sacrificed along the way. Therefore, before you do anything else, define your threat model. Afterwards, try to apply step-by-step whatever is required to protect your assets to a degree you're comfortable with^[2]^. If, however, this seems like too much work for you, then consider either one of the following: