funsec mailing list archives
Re: keyring management best practices
From: Marc Evans <marc () softwarehackery com>
Date: Thu, 19 Mar 2009 14:27:20 -0400
Valdis.Kletnieks () vt edu wrote:
On Thu, 19 Mar 2009 13:07:31 EDT, Marc Evans said:My question for this distinguished list of people is, what are your personal practices, and/or do you have suggestions that I should consider?The immediate question is, of course, the threat model - who are you worried will get the keys, and via what means? http://xkcd.com/538/
My answer would be, whomever steals the laptop, and/or is entitled to clone the contents of the system due to passing through a security checkpoint. Those are two very different cases in my mind, the the first one being the more probable (not that I consider either very likely). - Marc _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- keyring management best practices Marc Evans (Mar 19)
- Re: keyring management best practices Valdis . Kletnieks (Mar 19)
- Re: keyring management best practices Marc Evans (Mar 19)
- Re: keyring management best practices Ahmad Elkhatib (Mar 20)
- Re: keyring management best practices Valdis . Kletnieks (Mar 19)