![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
I’ve always been fascinated with the Holocaust and so when there was an interview with a Holocaust survivor on 60 minutes, I had to watch it. The woman said a bunch of stuff, but what stuck with me is that she said that, “people need to be given permission” to act badly. The episode showed previously undiscovered notes and pictures from one camp, showing officers having a picnic and enjoying themselves after a hard day of???
Her point was that these people were given permission. I now see it everywhere. Food fight in the school cafeteria? There were a few instigators who gave permission to the rest. A city protest that turns violent? Again, a few vocal minority of the group started the violence and then the rest joined in. I see it at work and I also see it on-line. Anonymity and lack of accountability also enhances the effect.
Whether the instigators are real or bots doesn’t really matter because they “gave permission” to the rest to misbehave.
Found the episode: https://www.cbsnews.com/news/pictures-show-nazi-life-at-auschwitz-as-jews-died-in-gas-chambers-60-minutes/
Take some time and really analyze your threat model. There are different solutions for each of them. For example, protecting against a friend swiping the drives may be as simple as LUKS on the drive and a USB key with the unlock keys. Another poster suggested leaving the backup computer wide open but encrypting the files that you back up with symmetric or asymmetric, based on your needs. If you’re hiding it from the government, check your local laws. You may be guilty until proven innocent in which case you need “plausible deniability” of what’s on the drive. That’s a different solution. Are you dealing with a well funded nation-state adversary? Maybe keying in the password isn’t such a bad idea.
I’m using LUKS with mandos on a raspberry PI. I back up to a Pi at a friend’s house over TailScale where the disk is wide open, but Duplicity will encrypt the backup file. My threat model is a run of the mill thief swiping the computers and script kiddies hacking in.