1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-11-16 13:22:39 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-11-10 16:39:55 +00:00
parent 73d7eb2068
commit 0edac2c872
30 changed files with 186 additions and 6 deletions

View File

@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
### Kensington Locks
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
## Secure your Network
### Compartmentalization