Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Encryption and risk



On Tue, Oct 06, 2009 at 10:41:32AM -0400, David Kramer wrote:
> > implementation perfect. Torture and imprisonment, and sometimes
> > the threats thereof, work all too well at obtaining immediately
> > verifiable secrets.
> 
> In this case, OTP could actually be worse, because you need to have
> ready access to the list of codes.  And if you do, chances are they will
> too after sufficient persuasion.


Right.

Step one should always be "Figure out your threat model."

Step two: "How much is it worth to you to keep this secret?"

-dsr-

-- 
http://tao.merseine.nu/~dsr/eula.html is hereby incorporated by reference.
You can't defend freedom by getting rid of it.






BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org