• @pivot_root@lemmy.world
    link
    fedilink
    English
    127 days ago

    Unless you have the other SSDs physically disconnected, you’re still running the risk of having your other installations affected by ransomware.

    • @nesc@lemmy.cafe
      link
      fedilink
      English
      37 days ago

      Probably, yeah, but I have exported snapshots and backups for such cases, and data itself is encrypted. So at worst a few hours lost. They can be easily disconnected i just never actually do it.

      • lazynooblet
        link
        fedilink
        English
        107 days ago

        Many malicious actors don’t trigger their payload that you would notice until after data has been mined.

        I’ve visited businesses to help put together basic infrastructure after their systems were encrypted and ransomed. We would bring up a backup from the night before only to find the system still infected. We would go back a week, 2 weeks, a month.

        These things lie in wait and only as the final nuclear option do they get noticed.

        • @nesc@lemmy.cafe
          link
          fedilink
          English
          16 days ago

          Kind of not a problem? If malware in question would try to write itself onto other drives it needs to know my luks pin and support my fs, so at worst it can try and fail. If it’s a windows machine that has it, well I’ll just nuke it after firat reoccurence. Realistically, I’ve had this setup for over a decade and there were 3-5 times when pirated game had malware.

          • lazynooblet
            link
            fedilink
            English
            16 days ago

            What’s stopping the malware just blowing the disks away? You keep backups disconnected right?

            • @nesc@lemmy.cafe
              link
              fedilink
              English
              16 days ago

              Yes, backups are on multiple separate devices, that are both online and offline.