• nialv7@lemmy.world
    link
    fedilink
    arrow-up
    9
    ·
    2 months ago

    Depends on your threat model. If you are defending against people stealing your hard drive and reading your data, then this is perfectly fine.