Avatar feed
Responses: 1
SPC Kevin Ford
0
0
0
i always work from the starting proposition if a sophisticated group gains physical access to my device they are going to get at whatever is on it and if they only have access over a network I'll just assume they might be able to get at whatever is on it. The countermeasures I take are to slow people down and weed out the unsophisticated.

Obviously there isn't anything on my devices that I think would be exceptionally problematic if revealed.
(0)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close