[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

One Laptop Per Terrorist



On Mon, Mar 30, 2015 at 11:20:47PM -0700, coderman wrote:
> two USB Armory not so large nor overkill. perhaps... :P
>   http://www.inversepath.com/usbarmory.html

this device - if unmodified - has severe limitations regarding inputs. e.g. if
the armory contains some key material, it's hard to have it stored in there in
a ciphertext, the only way to unlock (provide a decryption key for the
ciphertext inside) it currently is from the device you compartmentalize your
keys from, the host. there's a thing that is however extremely cool in this
device, the arm trustzone (cue the sad violinist while the TCM jamboree slides
are shown). pity that this gets so far ignored.

it's a neat but quite misunderstood device i think.

-- 
otr fp: https://www.ctrlc.hu/~stef/otr.txt