Talk:Security Advice

From Audacity Wiki
Jump to: navigation, search

This page started as some useful text about security on our website, that was not relevant to the specific incident and made it harder for users to find relevant information about the incident. That text was moved here so as not to lose it.

The intention is that this page will evolve into general advice for Audacity team members. For example, if has been attacked, assume the attacker can read emails sent to any email address - i.e. use other emails.

The page might become useful as general guidelines for end users too.