• @nesc@lemmy.cafe
    link
    fedilink
    English
    36 days ago

    Probably, yeah, but I have exported snapshots and backups for such cases, and data itself is encrypted. So at worst a few hours lost. They can be easily disconnected i just never actually do it.

    • lazynooblet
      link
      fedilink
      English
      116 days ago

      Many malicious actors don’t trigger their payload that you would notice until after data has been mined.

      I’ve visited businesses to help put together basic infrastructure after their systems were encrypted and ransomed. We would bring up a backup from the night before only to find the system still infected. We would go back a week, 2 weeks, a month.

      These things lie in wait and only as the final nuclear option do they get noticed.

      • @nesc@lemmy.cafe
        link
        fedilink
        English
        16 days ago

        Kind of not a problem? If malware in question would try to write itself onto other drives it needs to know my luks pin and support my fs, so at worst it can try and fail. If it’s a windows machine that has it, well I’ll just nuke it after firat reoccurence. Realistically, I’ve had this setup for over a decade and there were 3-5 times when pirated game had malware.

        • lazynooblet
          link
          fedilink
          English
          16 days ago

          What’s stopping the malware just blowing the disks away? You keep backups disconnected right?

          • @nesc@lemmy.cafe
            link
            fedilink
            English
            16 days ago

            Yes, backups are on multiple separate devices, that are both online and offline.