On Thu, 24 May 2007 02:48:35 -0500
Ron Johnson <[EMAIL PROTECTED]> wrote:

> On 05/24/07 02:30, Dan H wrote:
> > In fact, to those that really want to get at the data, a properly
> > encrypted (as in: unguessable passphrase, long enough key) laptop
> > will make any other approach than directly attacking the laptop more
> > feasible.
>
> Maybe it's just too late and I'm too tired, but I don't understand
> what you mean.

Physically breaking into the building of whoever is being spied on for
written notes or printouts. Getting a mole into the target organization.
Analyzing EM emissions from target. Intercepting IP traffic. Obtaining
passwords from target by bribe, extortion or torture. Any of those
promise more (and faster) success than attacking a well-encrypted disk,
and all of them are employed by truly interested parties.

--D.

Attachment: pgpoxRl6d4Vv6.pgp
Description: PGP signature

Reply via email to