One of the most basic tenets of cybersecurity is that you must “consider your threat model” when trying to keep your data and your communications safe, and then take appropriate steps to protect yourself.

This means you need to consider who you are, what you are talking about, and who may want to know that information (potential adversaries) for any given account, conversation, etc. The precautions you want to take to protect yourself if you are a random person messaging your partner about what you want to eat for dinner may be different than those you’d want to take, if, hypothetically, you are the Secretary of Defense of the United States or a National Security Advisor talking to top administration officials about your plans for bombing an apartment building in Yemen.

  • ricecake@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    5
    ·
    6 days ago

    I actually wouldn’t be shocked if it was possible with modern smartphones. A significant amount of money is available to be made from federal security work, and meeting the NSA criteria has benefits that extend to companies that work in the federal security space as well.