[149242] in cryptography@c2.net mail archive
Re: [Cryptography] The crypto behind the blackphone
daemon@ATHENA.MIT.EDU (Miles Fidelman)
Mon Jan 27 18:40:40 2014
X-Original-To: cryptography@metzdowd.com
Date: Mon, 27 Jan 2014 18:31:15 -0500
From: Miles Fidelman <mfidelman@meetinghouse.net>
CC: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <CAMm+LwhEm7jrTPaRfTQC0YM3pE8K5H7=Y5aPT1gHUbwNn6XJkA@mail.gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
Phillip Hallam-Baker wrote:
> As Robert Morris used to say, the three laws of computer security
>
> 1) Don't have a computer
so far so good
> 2) If you have a computer, don't turn it on
how do you know it hasn't turned itself on?
> 3) If you turn it on, don't use it
>
you may not be using it, but it could be watching you
--
In theory, there is no difference between theory and practice.
In practice, there is. .... Yogi Berra
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography