funsec mailing list archives

Re: keyring management best practices


From: Marc Evans <marc () softwarehackery com>
Date: Thu, 19 Mar 2009 14:27:20 -0400



Valdis.Kletnieks () vt edu wrote:
On Thu, 19 Mar 2009 13:07:31 EDT, Marc Evans said:

My question for this distinguished list of people is, what are your
personal practices, and/or do you have suggestions that I should consider?

The immediate question is, of course, the threat model - who are you worried
will get the keys, and via what means?

http://xkcd.com/538/

My answer would be, whomever steals the laptop, and/or is entitled to
clone the contents of the system due to passing through a security
checkpoint. Those are two very different cases in my mind, the the first
one being the more probable (not that I consider either very likely).

- Marc
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Current thread: