On Mon, 2005-06-27 at 10:19 -0400, John Denker wrote: > Even more compelling is: > -- obtain laptop hardware from a trusted source > -- obtain software from a trusted source > -- throw the entire laptop into a GSA-approved safe when > not being used.
This is just a minor variation of an approach I heard from Carl Ellison a decade or more ago: "the only secure computer is turned off, unplugged, inside a SCIF and surrounded by US Marines." [a SCIF is a Secure Compartmentalized Information Facility, used by the US Government folks] I think we tend to accept a bit more gray in the security versus usefullness grayscale. Pat -- Pat Farrell http://www.pfarrell.com/ --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]