From 10d53c0b2a70b01659ab04bf97b4ad8c797ec461 Mon Sep 17 00:00:00 2001 From: Michael Zhang Date: Wed, 17 Nov 2021 21:02:38 -0600 Subject: [PATCH] z --- content/posts/2021-08-11-backup-plan.md | 15 --------------- 1 file changed, 15 deletions(-) delete mode 100644 content/posts/2021-08-11-backup-plan.md diff --git a/content/posts/2021-08-11-backup-plan.md b/content/posts/2021-08-11-backup-plan.md deleted file mode 100644 index d82e0b9..0000000 --- a/content/posts/2021-08-11-backup-plan.md +++ /dev/null @@ -1,15 +0,0 @@ -+++ -title = "what's your backup plan?" -date = 2021-08-11 -draft = true -tags = ["computers"] -+++ - -Imagine this: you get hit by a car on vacation and you wake up with memory loss, everything that was on your person can be presumed to be gone forever. What kind of preparations can let you recover as _much_ as possible from this doomsday situation? - -We all have secrets that we keep, whether it be social security numbers, passwords, people's birthdays, but how we store that information is all very different. And sometimes, we store information in places that requires possession of other information. One question I began asking myself recently is: have I gotten my information into a circular dependency? - -Suppose I have a safe where I protect physical security, like a keep the code to a safe in my email, which I protect with a password and two-factor auth via security codes on my phone. - -- Talk about grace period between losing a form of authorization and being locked out from it --