What are your security goals?  Do you want to prevent key leakage,
or merely detect if it happens?  What is your threat model?  Are you
dealing with very sophisticated adversaries, or merely "the maid
casually snoops through the wastebasket"?

For many home offices, I would imagine that the main threat is attack
via the Internet, and for that you don't really need much in the way
of physical objects.



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to