Explains HTTPS vs E2EE, PGP.
- A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work? | Surveillance Self-Defense , 2) Intro to Privacy, Security and Anonymity , 3) Part 1: Introduction.
Full disk encryption and secure hard disk erasure.
And other possible attack vectors into consideration. Example: Metadata, bad OPSEC etc.