[17586] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: WYTM - "but what if it was true?"

daemon@ATHENA.MIT.EDU (John Denker)
Mon Jun 27 10:38:20 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 27 Jun 2005 10:19:13 -0400
From: John Denker <jsd@av8n.com>
To: Dan Kaminsky <dan@doxpara.com>
Cc: dan@geer.org, cryptography@metzdowd.com
In-Reply-To: <42BF8058.3010606@doxpara.com>

On 06/27/05 00:28, Dan Kaminsky wrote:

> ... there exists an acceptable solution that
> keeps PC's with persistent stores secure.  A bootable CD from a bank is
> an unexpectedly compelling option

Even more compelling is:
  -- obtain laptop hardware from a trusted source
  -- obtain software from a trusted source
  -- throw the entire laptop into a GSA-approved safe when
   not being used.

This is a widely-used procedure for dealing with classified
data.


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post