mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2024-12-22 21:01:34 -05:00
Finish the sentence
Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
c4fefacd96
commit
846bec0628
@ -7,7 +7,7 @@ author: Tommy
|
|||||||
|
|
||||||
While browsing privacy forums, I often see a lot discussions regarding laptop hardware security, especially in regards to resistance against physical attacks. Unfortunately, most of the advice given on these forums are incorrect, recommending people to buy overpriced products that are significantly less secure than standard laptops.
|
While browsing privacy forums, I often see a lot discussions regarding laptop hardware security, especially in regards to resistance against physical attacks. Unfortunately, most of the advice given on these forums are incorrect, recommending people to buy overpriced products that are significantly less secure than standard laptops.
|
||||||
|
|
||||||
In this post, I will walk you through a quick overview of how hardware security is generally implemented for laptops, what to look for, and what to avoid. We will not discuss Macbooks or Chromebooks, as they are vastly different from
|
In this post, I will walk you through a quick overview of how hardware security is generally implemented for laptops, what to look for, and what to avoid. We will not discuss Macbooks or Chromebooks, as they are vastly different from normal x86 Windows/Linux hardware.
|
||||||
|
|
||||||
![Latitude 9440](/images/latitude-9440.jpg)
|
![Latitude 9440](/images/latitude-9440.jpg)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user