-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 If it's sensitive > enough to be encrypted outgoing, it's sensitive enough to be > encrypted on disk... even if you haven't actually sent it yet. >
Well, its easy enough to encrypt the whole disk with modern OS's, so if the message is on your machine it could be made pretty secure with no real extra effort beyond setting it up initially for an encrypted disk. Then they would have to deal with physical security to get the message, i.e.: disarm the operator and hold a gun to his head to get the pass phrase. As only an idiot would actually give the correct pass phrase (because such an assailant would not want any inconvenient loose ends left alive after the data theft), it would be pretty darn secure. I dunno though, why would you want to store a sensitive draft any longer than you need to? Encrypted messages should be as concise as possible, so if you get interrupted during composition, would it not be better to delete the draft and start it over after you have dealt with the KGB or whatever? - -- Dale A. Raby Buy My Book: 777 Bon Mots for Gunslingers and Other Real Men Available at Amazon, Google Books, Barnes & Noble, Book Tango, and other online book stores. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlIp/TwACgkQq4gfK1twdnfoigCfZ6LmGSmrtj+0B0mpbu3exjXd wx4AniZt/7OChTNkrB2kZYYWWKRP1Qel =LVop -----END PGP SIGNATURE-----
