• pivot_root@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    ·
    5 days ago

    Unless you have the other SSDs physically disconnected, you’re still running the risk of having your other installations affected by ransomware.

    • nesc@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      3
      ·
      5 days ago

      Probably, yeah, but I have exported snapshots and backups for such cases, and data itself is encrypted. So at worst a few hours lost. They can be easily disconnected i just never actually do it.

      • lazynooblet@lazysoci.al
        link
        fedilink
        English
        arrow-up
        11
        ·
        5 days ago

        Many malicious actors don’t trigger their payload that you would notice until after data has been mined.

        I’ve visited businesses to help put together basic infrastructure after their systems were encrypted and ransomed. We would bring up a backup from the night before only to find the system still infected. We would go back a week, 2 weeks, a month.

        These things lie in wait and only as the final nuclear option do they get noticed.

        • nesc@lemmy.cafe
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 days ago

          Kind of not a problem? If malware in question would try to write itself onto other drives it needs to know my luks pin and support my fs, so at worst it can try and fail. If it’s a windows machine that has it, well I’ll just nuke it after firat reoccurence. Realistically, I’ve had this setup for over a decade and there were 3-5 times when pirated game had malware.

            • nesc@lemmy.cafe
              link
              fedilink
              English
              arrow-up
              1
              ·
              5 days ago

              Yes, backups are on multiple separate devices, that are both online and offline.