Good note.  Shows why we (should) all get paid the big bucks to create
secure systems. :)  Everything's a trade-off.

I was assuming the adversary had physical access to the machine's console
and could reboot, etc., at will, which seems to make your defense moot,
at least for the (very few) systems I'm aware of.
        /r$

Reply via email to