diff --git a/README.md b/README.md index 663f873..c204754 100644 --- a/README.md +++ b/README.md @@ -380,6 +380,7 @@ Identify possible threats. For each category of information that you deem sensit Analyze security holes and other vulnerabilities. Assess your current safeguards and determine what, if any, loopholes or weaknesses exist that may be exploited to gain access to your sensitive data. - [Can forensic science still recover data from a hard drive after a seven-pass wipe?](https://www.quora.com/Can-forensic-science-still-recover-data-from-a-hard-drive-after-a-seven-pass-wipe?) +- You may also try using [LUKS!](https://en.m.wikipedia.org/wiki/Linux_Unified_Key_Setup) - [File carving](https://resources.infosecinstitute.com/topic/file-carving) - [Read More](https://www.lopp.net/bitcoin-information/security.html) - [Choose Veracrypt (better) or FileVault!](https://book.cyberyozh.com/veracrypt-veracrypt-vs-truecrypt)