From 846bec0628d9bbfd08ea5b25d44d9fb84af89ed6 Mon Sep 17 00:00:00 2001 From: Tommy Date: Mon, 10 Jun 2024 02:49:16 -0700 Subject: [PATCH] Finish the sentence Signed-off-by: Tommy --- content/posts/knowledge/Laptop Hardware Security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/knowledge/Laptop Hardware Security.md b/content/posts/knowledge/Laptop Hardware Security.md index 2737123..bdb2e55 100644 --- a/content/posts/knowledge/Laptop Hardware Security.md +++ b/content/posts/knowledge/Laptop Hardware Security.md @@ -7,7 +7,7 @@ author: Tommy While browsing privacy forums, I often see a lot discussions regarding laptop hardware security, especially in regards to resistance against physical attacks. Unfortunately, most of the advice given on these forums are incorrect, recommending people to buy overpriced products that are significantly less secure than standard laptops. -In this post, I will walk you through a quick overview of how hardware security is generally implemented for laptops, what to look for, and what to avoid. We will not discuss Macbooks or Chromebooks, as they are vastly different from +In this post, I will walk you through a quick overview of how hardware security is generally implemented for laptops, what to look for, and what to avoid. We will not discuss Macbooks or Chromebooks, as they are vastly different from normal x86 Windows/Linux hardware. ![Latitude 9440](/images/latitude-9440.jpg)