-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
> Once a computer or other device that needs secure access is sufficiently > protected, it becomes cheaper for a large government agency to resort to > bribery or torture to get the information it wants. Assuming they do not > wish to try bribery, are you sure you want your machine that safe? That's a silly argument. Because they are ways of obtaining your passphrase by force, you shouldn't bother using one or take other protective measures? Last I heard, the government of Finland was not known for torturing its citizens. > I assume you are using gnupg for all your correspondence with everyone. If > you encrypt only your sensitive communications, it will be painfully obvious > which of your e-mails to decrypt, saving the black hats a lot of trouble. A lot of trouble in what way? Do you know of a black hat agency able to decrypt exiting gpg-encrypted messages? The original poster may want to check out "Tinfoil Hat Linux"[1] which has some interesting capabilities, including an anti-keylogger measure. A laptop or PDA with its own keyboard could be useful as well. [1] http://tinfoilhat.shmoo.com/ - -- Greg Sabino Mullane [EMAIL PROTECTED] PGP Key: 0x14964AC8 200509040917 http://biglumber.com/x/web?pk=2529DF6AB8F79407E94445B4BC9B906714964AC8 -----BEGIN PGP SIGNATURE----- iD8DBQFDGvUcvJuQZxSWSsgRAuBNAJ9MyKp4Vgqb+Q1++Jlqq0u+FIxo3ACg1Gkj WReipnoNerGwxTTCI8oeZgE= =zyQY -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users