[17588] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: WYTM - "but what if it was true?"

daemon@ATHENA.MIT.EDU (Pat Farrell)
Mon Jun 27 15:40:11 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Pat Farrell <pfarrell@pfarrell.com>
Reply-To: pfarrell@pfarrell.com
To: John Denker <jsd@av8n.com>
Cc: Dan Kaminsky <dan@doxpara.com>, dan@geer.org,
	cryptography@metzdowd.com
In-Reply-To: <42C00AE1.9060509@av8n.com>
Date: Mon, 27 Jun 2005 13:32:33 -0400

On Mon, 2005-06-27 at 10:19 -0400, John Denker wrote:
> Even more compelling is:
>   -- obtain laptop hardware from a trusted source
>   -- obtain software from a trusted source
>   -- throw the entire laptop into a GSA-approved safe when
>    not being used.

This is just a minor variation of an approach I heard from
Carl Ellison a decade or more ago:

"the only secure computer is turned off, unplugged,
inside a SCIF and surrounded by US Marines."

[a SCIF is a Secure Compartmentalized Information Facility,
used by the US Government folks]

I think we tend to accept a bit more gray
in the security versus usefullness grayscale.

Pat
-- 
Pat Farrell         
http://www.pfarrell.com/



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post