[17586] in cryptography@c2.net mail archive
Re: WYTM - "but what if it was true?"
daemon@ATHENA.MIT.EDU (John Denker)
Mon Jun 27 10:38:20 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 27 Jun 2005 10:19:13 -0400
From: John Denker <jsd@av8n.com>
To: Dan Kaminsky <dan@doxpara.com>
Cc: dan@geer.org, cryptography@metzdowd.com
In-Reply-To: <42BF8058.3010606@doxpara.com>
On 06/27/05 00:28, Dan Kaminsky wrote:
> ... there exists an acceptable solution that
> keeps PC's with persistent stores secure. A bootable CD from a bank is
> an unexpectedly compelling option
Even more compelling is:
-- obtain laptop hardware from a trusted source
-- obtain software from a trusted source
-- throw the entire laptop into a GSA-approved safe when
not being used.
This is a widely-used procedure for dealing with classified
data.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com