Editing Talk:538: Security
Please sign your posts with ~~~~ |
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 13: | Line 13: | ||
:: It says in the comic that the 'crypto nerd' is a 'him': "'''His''' laptop is encrypted". --[[Special:Contributions/108.162.216.118|108.162.216.118]] 15:45, 5 July 2020 (UTC) | :: It says in the comic that the 'crypto nerd' is a 'him': "'''His''' laptop is encrypted". --[[Special:Contributions/108.162.216.118|108.162.216.118]] 15:45, 5 July 2020 (UTC) | ||
Same concept as [[416: Zealous Autoconfig]]. [[User:Shanek|Shanek]] ([[User talk:Shanek|talk]]) 12:31, 1 May 2015 (UTC) | Same concept as [[416: Zealous Autoconfig]]. [[User:Shanek|Shanek]] ([[User talk:Shanek|talk]]) 12:31, 1 May 2015 (UTC) | ||
β | |||
What would happen if the owner of the computer used deniable cryptography with some decoy message? -- [[Special:Contributions/173.245.48.141|173.245.48.141]] 08:35, 15 July 2015 (UTC) | What would happen if the owner of the computer used deniable cryptography with some decoy message? -- [[Special:Contributions/173.245.48.141|173.245.48.141]] 08:35, 15 July 2015 (UTC) |