[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Learning from dpr mistakes
- To: David Honig <[email protected]>
- Subject: Learning from dpr mistakes
- From: [email protected] (Travis Biehn)
- Date: Tue, 10 Feb 2015 20:00:59 -0500
- Cc: [email protected]
- In-reply-to: <20150211001214.NWJH32693.eastrmfepo103.cox.net@eastrmimpo210>
- References: <CAEm6KbL-MYf=ycAJGaXF5dHQ9_tfV2bkU1eLw8JHF=CQVaDAtg@mail.gmail.com> <[email protected]> <1680857.CAZYUBBF9N@lapuntu> <20150211001214.NWJH32693.eastrmfepo103.cox.net@eastrmimpo210>
The feds probably had enough to convict even without his laptops'
contents...
But yeah, monitoring the environment is a solid idea, as is CPU <-> RAM
encrypted pipeline.
Internet access is usually the first thing that's cut. (Unless your
attacker knows you use it as a trigger, or maybe possibly thought about
using it as a trigger.)
Travis
On Feb 10, 2015 7:28 PM, "David Honig" <[email protected]> wrote:
>
> A number of public reviews of DPR's infosec mistakes have been published.
>
>
> I think a strong solution to the 'tackled in library' defects would be to
> have:
>
> 1) program to notice his magic bracelet is not near
> 2) program to notice that vid cam is not a head but a chaotic scene
>
> #2 is particularly easy without extra hardware (ca. 2015) You'll have to
> switch it off when you
> visit the loo.
>
> And of course, things like 'back to wall facing forward' would have been
> helpful.
> Claustophilia is a useful trait.
>
>
>
>
> I wish to God these calculations could be done by a
> steam engine,â?? Babbage complained
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20150210/dff1104e/attachment.html>