Ah, you “work” in “marketing”?
Ah, you “work” in “marketing”?
They occupy a strange niche full of contradictions.
Entering the code on the device itself should increase security as opposed to entering it on a compromised computer.
But plugging it into a compromised computer means the data is compromised anyway.
Their security is way harder to audit than a software solution like PGP. The actual “encryption” varies from actual decent setups to “entering the code connects the data pins with no actual encryption on the storage chip”
Not having to instal/use software to use them means they are suitable for non-technical users which in turn means more support calls for “I forgot the pin, it wiped itself, can you restore my data”
They are kind of useful to check the “data is transported on encrypted media” box for compliance reasons without having to manage something bigger.
It doesn’t. It carries you by having a module for absolutely everything even shooting yourself in the foot.
I run a 2 node k3s cluster. There are a few small advantages over docker swarm, built-in network policies to lock down my VPN/Torrent pod being the main one.
Other than that writing kubernetes yaml files is a lot more verbose than docker-compose. Helm does make it bearable, though.
Due to real-life my migration to the cluster is real slow, but the goal is to move all my services over.
It’s not “better” than compose but I like it and it’s nice to have worked with it.
Coconut at least…