this post was submitted on 27 Oct 2025
170 points (92.9% liked)
Linux
9942 readers
2054 users here now
A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You lost me at the encryption part. How does encrypting enforce permissions?
Enforces confidentiality and integrity.
Encryption on transports protects from man in the middle and sniffing. At rest protects evil maid exploits, which for these systems is more about preventing malicious software being swapped in place of trusted software.
The same applies to encryption of links like pcie and memory with the time of transport and rest changing.