[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] InfoSec sleuths beware ...
- To: full-disclosure@lists.netsys.com
- Subject: Re: [Full-Disclosure] InfoSec sleuths beware ...
- From: michael williamson <michael@puffin.tamucc.edu>
- Date: Thu, 19 Feb 2004 15:22:12 -0600
And you think this could be reliably implemented on a mickeysoft
platform?
On Thu, 2004-02-19 at 08:07, Exibar wrote:
--snip--
> I would think that a more controllable environment would be a laptop that
> must phone home every 5 minutes of activity or gets securely wiped. Better
> yet, an encrypted laptop where access to the sourcecode is limited to 5
> minutes and then you must FOB authenticate back into it. After 30 minutes
> of activity and no FOB re-entry you must call back to Microsoft for a new
> software FOB. After one hour of activity and no FOB authentication the
> whole laptop becomes irreversibly encrypted and must be sent back to
> Microsoft to be re-built.
>
> Ok maybe that's TOO secure :-)
--snip--
Michael
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html