If physical security concern you, you should encrypt your disk, but e2e isn’t really useful if you host your instance and use a VPN to connect (it’s not necessary even if you trust the 3rd party that host your data, actually)
Roman Dmitrievič Protasevič è stato arrestato dalla dittatura bielorussa dopo che il suo volo civile Europeo è stato dirottato e costretto ad atterrare da caccia militari bielorussi. Per non dimenticare il suo nome e quanto accaduto.
If physical security concern you, you should encrypt your disk, but e2e isn’t really useful if you host your instance and use a VPN to connect (it’s not necessary even if you trust the 3rd party that host your data, actually)
I thank you for your effort in this post, and I appreciate anyone who try to give real and complete answer to this kind of question, but I’d like to point out that madaidan “guides” aren’t reliable, and shouldn’t be linked as useful source of information, since he usually just spread FUD. Nothing he even wrote is actually useful to real users and common people, and even if I understand he know what he’s talking about this doesn’t mean his interpretation is correct. Security isn’t absolute, and safety from any ideal danger that at this time no one even know how to exploit shouldn’t be the ultimate goal for everyone. Sorry for my bad English, I hope I made myself clear
Battery shape (and connector) will sadly still be a thing for a long time, and usually it’s for engineering reasons, so I don’t really think it will be possible to standardize it
Mmm… I still think you mean server side: if someone seize your server shouldn’t be able to read your file. If someone have physical access to your server while it is still turn on and not rebooted, it will have access to your files even with e2e turned on. E2e encrypt data while it is transfered from client to server (in case of nextcloud)