10 Nov
2023
10 Nov
'23
5:43 p.m.
we also formed a guess regarding how to secure a system. only parts are preserved here. - user forms digital trance habits (you know digital trance, like checking email, or navigating twitter or youtube, or coding for hours) that can keep going the same way offline - user transitions to airgapped devices and continues offline note: when engaging online people or online behaviors be very careful, take slowly, learn from each event. [if you can, try to go longer each time. prefer to not do this at all.] - after getting trance habits familiar with offline behavior, user transitions to clean devices - after adjusting to being offline with clean devices, user begins security logging and moves into shielded environment