WYTM - "but what if it was true?"
Pat Farrell
pfarrell at pfarrell.com
Mon Jun 27 13:32:33 EDT 2005
On Mon, 2005-06-27 at 10:19 -0400, John Denker wrote:
> Even more compelling is:
> -- obtain laptop hardware from a trusted source
> -- obtain software from a trusted source
> -- throw the entire laptop into a GSA-approved safe when
> not being used.
This is just a minor variation of an approach I heard from
Carl Ellison a decade or more ago:
"the only secure computer is turned off, unplugged,
inside a SCIF and surrounded by US Marines."
[a SCIF is a Secure Compartmentalized Information Facility,
used by the US Government folks]
I think we tend to accept a bit more gray
in the security versus usefullness grayscale.
Pat
--
Pat Farrell
http://www.pfarrell.com/
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list