[Discuss] Most common (or Most important) privacy leaks

Jerry Feldman gaf at blu.org
Fri Feb 20 06:54:37 EST 2015


On 02/19/2015 11:07 AM, Gordon Marx wrote:
> On Thu, Feb 19, 2015 at 10:52 AM, Doug <sweetser at alum.mit.edu> wrote:
>> > 2. I would like to hear more about " tools for plausible-deniability of the
>> > existence of secondary access codes".  I don't quite know what that means.
> I think the idea is to give the ability to communicate to the system
> "Yes, I'm logging in, but I'm being coerced -- but don't let on that
> you know, because I'm in danger if this doesn't appear to work".
I agree with this. This should also be employed in home security systems
also.

-- 
Jerry Feldman <gaf at blu.org>
Boston Linux and Unix
PGP key id:B7F14F2F
PGP Key fingerprint: D937 A424 4836 E052 2E1B  8DC6 24D7 000F B7F1 4F2F





More information about the Discuss mailing list