Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Tue, Oct 06, 2009 at 10:41:32AM -0400, David Kramer wrote: > > implementation perfect. Torture and imprisonment, and sometimes > > the threats thereof, work all too well at obtaining immediately > > verifiable secrets. > > In this case, OTP could actually be worse, because you need to have > ready access to the list of codes. And if you do, chances are they will > too after sufficient persuasion. Right. Step one should always be "Figure out your threat model." Step two: "How much is it worth to you to keep this secret?" -dsr- -- http://tao.merseine.nu/~dsr/eula.html is hereby incorporated by reference. You can't defend freedom by getting rid of it.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |