[email protected] wrote:
> On Thu, 19 Mar 2009 13:07:31 EDT, Marc Evans said:
> 
>> My question for this distinguished list of people is, what are your
>> personal practices, and/or do you have suggestions that I should consider?
> 
> The immediate question is, of course, the threat model - who are you worried
> will get the keys, and via what means?
> 
> http://xkcd.com/538/

My answer would be, whomever steals the laptop, and/or is entitled to
clone the contents of the system due to passing through a security
checkpoint. Those are two very different cases in my mind, the the first
one being the more probable (not that I consider either very likely).

- Marc
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to