On Thu, 24 May 2007 02:48:35 -0500 Ron Johnson <firstname.lastname@example.org> wrote: > On 05/24/07 02:30, Dan H wrote: > > In fact, to those that really want to get at the data, a properly > > encrypted (as in: unguessable passphrase, long enough key) laptop > > will make any other approach than directly attacking the laptop more > > feasible. > > Maybe it's just too late and I'm too tired, but I don't understand > what you mean. Physically breaking into the building of whoever is being spied on for written notes or printouts. Getting a mole into the target organization. Analyzing EM emissions from target. Intercepting IP traffic. Obtaining passwords from target by bribe, extortion or torture. Any of those promise more (and faster) success than attacking a well-encrypted disk, and all of them are employed by truly interested parties. --D.
Description: PGP signature