What are your security goals? Do you want to prevent key leakage, or merely detect if it happens? What is your threat model? Are you dealing with very sophisticated adversaries, or merely "the maid casually snoops through the wastebasket"?
For many home offices, I would imagine that the main threat is attack via the Internet, and for that you don't really need much in the way of physical objects. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]