[email protected] wrote: > On Thu, 19 Mar 2009 13:07:31 EDT, Marc Evans said: > >> My question for this distinguished list of people is, what are your >> personal practices, and/or do you have suggestions that I should consider? > > The immediate question is, of course, the threat model - who are you worried > will get the keys, and via what means? > > http://xkcd.com/538/
My answer would be, whomever steals the laptop, and/or is entitled to clone the contents of the system due to passing through a security checkpoint. Those are two very different cases in my mind, the the first one being the more probable (not that I consider either very likely). - Marc _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
