On Mon, 2005-06-27 at 10:19 -0400, John Denker wrote:
> Even more compelling is:
>   -- obtain laptop hardware from a trusted source
>   -- obtain software from a trusted source
>   -- throw the entire laptop into a GSA-approved safe when
>    not being used.

This is just a minor variation of an approach I heard from
Carl Ellison a decade or more ago:

"the only secure computer is turned off, unplugged,
inside a SCIF and surrounded by US Marines."

[a SCIF is a Secure Compartmentalized Information Facility,
used by the US Government folks]

I think we tend to accept a bit more gray
in the security versus usefullness grayscale.

Pat
-- 
Pat Farrell         
http://www.pfarrell.com/



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to