Securing your digital home – part 3: keys and other secrets

In part 2 of this series we walked through the thought process around your digital ID. Once that’s established, you need to protect the keys and other secrets attached to this identity, such as passwords and cryptographic keys. In this blog post I will write about my own personal approach to this with some recommendations. Continue reading “Securing your digital home – part 3: keys and other secrets”