-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/24/07 03:09, Dan H wrote: > On Thu, 24 May 2007 02:48:35 -0500 > Ron Johnson <[EMAIL PROTECTED]> wrote: > >> On 05/24/07 02:30, Dan H wrote: >>> In fact, to those that really want to get at the data, a properly >>> encrypted (as in: unguessable passphrase, long enough key) laptop >>> will make any other approach than directly attacking the laptop more >>> feasible. >> Maybe it's just too late and I'm too tired, but I don't understand >> what you mean. > > Physically breaking into the building of whoever is being spied on for > written notes or printouts. Getting a mole into the target organization. > Analyzing EM emissions from target. Intercepting IP traffic. Obtaining > passwords from target by bribe, extortion or torture. Any of those > promise more (and faster) success than attacking a well-encrypted disk, > and all of them are employed by truly interested parties.
Ah, gotcha. Black bag ops, TEMPEST, CARNIVORE, social engineering & rubber hose cryptography. - -- Ron Johnson, Jr. Jefferson LA USA Give a man a fish, and he eats for a day. Hit him with a fish, and he goes away for good! -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGVUrfS9HxQb37XmcRArx/AJ9bAVmwnYKPxHvjOxVZGgLZ+EvvdQCfQqPK CnCUsgGcNn2KDDVmsIFN89Q= =6nyU -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]