WYTM - "but what if it was true?"

Pat Farrell pfarrell at pfarrell.com
Mon Jun 27 13:32:33 EDT 2005


On Mon, 2005-06-27 at 10:19 -0400, John Denker wrote:
> Even more compelling is:
>   -- obtain laptop hardware from a trusted source
>   -- obtain software from a trusted source
>   -- throw the entire laptop into a GSA-approved safe when
>    not being used.

This is just a minor variation of an approach I heard from
Carl Ellison a decade or more ago:

"the only secure computer is turned off, unplugged,
inside a SCIF and surrounded by US Marines."

[a SCIF is a Secure Compartmentalized Information Facility,
used by the US Government folks]

I think we tend to accept a bit more gray
in the security versus usefullness grayscale.

Pat
-- 
Pat Farrell         
http://www.pfarrell.com/



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list