-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/17/2013 11:02 PM, Robert J. Hansen wrote: > On 12/17/2013 10:57 PM, Matt D wrote: >> Lets assume I run Ubuntu live from USB stick or cd when I need >> secure messaging so an attacker cannot predict what machine i >> will send my message from and there will be nothing left on the >> machine. The encrypted message is captured but the adversary >> does not have access to me. What sort of attack has any chance >> to decrypt the message? > > Beating your kneecaps into pulp, hiring a hooker to persuade the > secret out of you, beating your recipient's kneecaps into pulp, > hiring a hooker to persuade the secret out of your correspondent, > Van Eycking your terminal, Van Eycking your recipient's terminal, > figuring out a way to plant an exploit on your USB stick... I could > go on for quite some time, but you get the idea. The best ways to > recover the message do not involve cryptanalysis, and the > non-cryptanalytic means are devastatingly effective. > So in other words the message can not be read by some govt genius with a rack of computers??
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.21 (GNU/Linux) Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBAgAGBQJSsSElAAoJECrdp7MWSIVb4tIH/j3GJ91LkIEWOKyJ12VD0zkZ PH2by0RFWP6EIZWcek2zCtwbte1u5EiF4qqrVhkkSs+mQD+K87rdZMZFGsTjqxzL j8u8leyOOUm6jWXzLvncIVG5qYO6Tk1xIFKvNZK34hgnpxJ4JZm4tuzlgbK6S803 8A0i9beBITbFGrUIqr4/Xn9Ir9UOJEW7knhTZZnv1168p4sN4tuq5ei42yespAkz HWMEtCyrI/xQHjc2YQB4mp9UnRAxIos0P8mdtJhN6ZSw6+UTFH30kSPslq159rWO cT8LYxfd7wZwcS36mbXpWU8U6cxzXQp3/KcZ9ffJJsi7etnKCUCNLUOvigbfz9U= =EAPZ -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users