[17588] in cryptography@c2.net mail archive
Re: WYTM - "but what if it was true?"
daemon@ATHENA.MIT.EDU (Pat Farrell)
Mon Jun 27 15:40:11 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Pat Farrell <pfarrell@pfarrell.com>
Reply-To: pfarrell@pfarrell.com
To: John Denker <jsd@av8n.com>
Cc: Dan Kaminsky <dan@doxpara.com>, dan@geer.org,
cryptography@metzdowd.com
In-Reply-To: <42C00AE1.9060509@av8n.com>
Date: Mon, 27 Jun 2005 13:32:33 -0400
On Mon, 2005-06-27 at 10:19 -0400, John Denker wrote:
> Even more compelling is:
> -- obtain laptop hardware from a trusted source
> -- obtain software from a trusted source
> -- throw the entire laptop into a GSA-approved safe when
> not being used.
This is just a minor variation of an approach I heard from
Carl Ellison a decade or more ago:
"the only secure computer is turned off, unplugged,
inside a SCIF and surrounded by US Marines."
[a SCIF is a Secure Compartmentalized Information Facility,
used by the US Government folks]
I think we tend to accept a bit more gray
in the security versus usefullness grayscale.
Pat
--
Pat Farrell
http://www.pfarrell.com/
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com