About this episode
Have you ever lost your phone? Had a computer stolen? Worried about someone accessing your device without your consent? Losing a device can be catastrophic - especially if you store sensitive data on there. In this video, I'll talk about how to enable Full Disk Encryption to protect your devices from unauthorized access.Learn more at https://thenewoil.org/backups.htmlSupport us at https://thenewoil.org/support.htmlMonero address: 44NAYMG1qupZcZ5WtjHWp58WNkXjetpTbRKHkVyrFZs8SiZK7SycQKdAm5y7sXuVhV1eYcShLjkKpbLRQSZaKxpvV2zo8iiYou can also view these videos on other websites.YouTube: https://youtube.com/thenewoilOdysee: https://odysee.com/@thenewoilPeerTube: https://peertube.thenewoil.xyz/video-channels/tno/videosSource 1: https://www.bleepingcomputer.com/news/security/redline-malware-shows-why-passwords-shouldnt-be-saved-in-browsers/Source 2: https://www.youtube.com/watch?v=oqHi_UAQAlQ; https://odysee.com/@thenewoil:7/let's-talk-about-backups:7; https://peertube.thenewoil.xyz/w/szazfYrHGH5yJVnQKo6HkzSource 3: https://www.youtube.com/watch?v=k9YSSxfJU10; https://odysee.com/@thenewoil:7/everything-you-need-to-know-about-2:ef; https://peertube.thenewoil.xyz/w/eXQtSCj9mTkbMd2R9Jv8hbSource 4: https://www.isumsoft.com/computer/how-much-does-bitlocker-impacts-on-hard-disk-io-performance.htmlSource 5: https://www.huffpost.com/entry/neil-gaiman-doctor-who-script-found_n_2159490\Source 6: https://www.lifewire.com/encrypt-iphone-5193023Source 7: https://www.hexnode.com/blogs/everything-you-need-to-know-about-android-encryption/Source 8: My video about passwords, https://www.youtube.com/watch?v=NkqOsddlx_c; https://odysee.com/@thenewoil:7/everything-you-need-to-know-about:d2; https://peertube.thenewoil.xyz/w/gMgRwCGSYBnEc2QLYUSvD4Source 9: https://www.independent.co.uk/tech/iphone-x-apple-face-id-facial-recognition-privacy-security-truth-real-safety-a8040131.htmlSource 10: https://support.google.com/pixelphone/answer/6300638?hl=enSource 11: https://www.forbes.com/sites/thomasbrewster/2017/11/27/apple-face-id-artificial-intelligence-twin-mask-attacks-iphone-x/Source 12: https://arstechnica.com/information-technology/2020/04/attackers-can-bypass-fingerprint-authentication-with-an-80-success-rate/Source 13: https://www.theguardian.com/world/2017/nov/08/qatar-airways-plane-forced-to-land-after-wife-discovers-husbands-affair-midflightSource 14: https://haveibeenpwned.com/PasswordsSource 15: https://www.simoptions.com/sim-card-information/Source 16: https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838Source 17: https://sourceforge.net/projects/truecrypt/...https://www.youtube.com/watch?v=xWwQYDEsyuM