• nesc@lemmy.cafe
    link
    fedilink
    English
    arrow-up
    3
    ·
    5 days ago

    Probably, yeah, but I have exported snapshots and backups for such cases, and data itself is encrypted. So at worst a few hours lost. They can be easily disconnected i just never actually do it.

    • lazynooblet@lazysoci.al
      link
      fedilink
      English
      arrow-up
      11
      ·
      5 days ago

      Many malicious actors don’t trigger their payload that you would notice until after data has been mined.

      I’ve visited businesses to help put together basic infrastructure after their systems were encrypted and ransomed. We would bring up a backup from the night before only to find the system still infected. We would go back a week, 2 weeks, a month.

      These things lie in wait and only as the final nuclear option do they get noticed.

      • nesc@lemmy.cafe
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 days ago

        Kind of not a problem? If malware in question would try to write itself onto other drives it needs to know my luks pin and support my fs, so at worst it can try and fail. If it’s a windows machine that has it, well I’ll just nuke it after firat reoccurence. Realistically, I’ve had this setup for over a decade and there were 3-5 times when pirated game had malware.

          • nesc@lemmy.cafe
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 days ago

            Yes, backups are on multiple separate devices, that are both online and offline.