On Sat, 7 Nov 2015, Keith Lofstrom wrote: > I agree ... but ... the real issue is that the hardware itself is > insecure, and does not speed up security procedures as much as it should.
Thank you, Keith, for mentioning the third leg of the computing security stool: hardware. I suggest that the desired security levels will be achieved only when attention is paid to all three legs: hardware, software, and carbonware. Focusing on one while ignoring the others still leaves us and our data at risk. BTW, packing a tent's vault door is heavy and uncomfortable but does confuse bears seeking food at night. Rich _______________________________________________ PLUG mailing list [email protected] http://lists.pdxlinux.org/mailman/listinfo/plug
