I’d say I am not too far behind this article’s author. I think some of his measures are perhaps a bit extreme for a personal network and personal systems, but I agree with the general point. If you practice good security, regardless of the actual threat, then you are in good standing if a threat actually does materialize. For stealth exploits, what else can you really do, anyway?
Ogg Vorbis is a totally open format.
There are many ways you can support the blog and the podcast.
All media available for download on this site is DRM-free. Label courtesy of the FSF's Defective By Design campaign, under a CC-BY-SA Unported 3.0 license.
The views and opinions expressed on this site and in the podcast are my own and don't necessarily reflect those of my employer or anyone else.