On Sat, 7 Nov 2015, Keith Lofstrom wrote:

> I agree ... but ... the real issue is that the hardware itself is
> insecure, and does not speed up security procedures as much as it should.

   Thank you, Keith, for mentioning the third leg of the computing security
stool: hardware. I suggest that the desired security levels will be achieved
only when attention is paid to all three legs: hardware, software, and
carbonware. Focusing on one while ignoring the others still leaves us and
our data at risk.

   BTW, packing a tent's vault door is heavy and uncomfortable but does
confuse bears seeking food at night.

Rich
_______________________________________________
PLUG mailing list
[email protected]
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to