this post was submitted on 27 Oct 2025
171 points (93.0% liked)
Linux
10029 readers
374 users here now
A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You lost me at the encryption part. How does encrypting enforce permissions?
Enforces confidentiality and integrity.
Encryption on transports protects from man in the middle and sniffing. At rest protects evil maid exploits, which for these systems is more about preventing malicious software being swapped in place of trusted software.
The same applies to encryption of links like pcie and memory with the time of transport and rest changing.