[Cryptography] Rubber-hose resistance?

Jeremy Stanley fungi at yuggoth.org
Wed Dec 20 13:31:24 EST 2017


On 2017-12-20 16:05:10 +1100 (+1100), Matt Palmer wrote:
[...]
> Do you take into account the possibility of MitM attacks
> post-border crossing, by making a record of the remote host key?
> And if so, how?  Or is your threat model focused on the border
> itself, and you don't have to worry so much about on-going attacks
> thereafter?

Also, when crossing some borders, your devices may leave your person
and be out of visual range for extended periods of time before you
get them back. In such circumstances do you consider them probably
compromised (perhaps even at the firmware or hardware level) and
quarantine or dispose of them accordingly?
-- 
Jeremy Stanley


More information about the cryptography mailing list