(CC'ing the list because I think thats what you intended)
This is an interesting option I wasn't aware of. It is in line with what I recommend, so I am all for it.
Where is the new version of Liberte that can be customized for my operations platform? :)
--gq
On Dec 20, 2012, at 06:43 , Maxim Kammerer <
m...@dee.su> wrote:
> On Thu, Dec 20, 2012 at 12:26 AM, the grugq <
theg...@gmail.com> wrote:
>> Access to the $HOME box requires a passphrase (to unlock the ssh key),
>> and the physical location of the $HOME box is unknown (and probably in a
>> remote jurisdiction).
>
> Once you are talking about a thin client, then there is no need for
> unattended operation, which is risky, since you assume that the
> attacker is not aware of the safeguards. Just use a
> boot-media-is-present watchdog functionality, as e.g. present in
> Liberté Linux (and later ported to Tails), and have the media
> connected to you via a chain or something similar. When the media is
> extracted, the system performs an emergency shutdown, and RAM is
> wiped. Otherwise, attackers can just open the unattended laptop and
> put its memory into a portable freezer for further investigation in a
> lab. Even if you use things like encrypted memory (PrivateCore),
> attackers can still apply pressure if you and the thin client are
> separated (not necessarily torture — e.g., refuse of cooperation could
> carry a legal penalty).
>
> I have actually read about such setups being used in Russian
> companies, where it was (is still?) customary to have various LE
> agencies burst into your office and seize all equipment because your
> competitor paid more money to local officials. E.g., all accounting
> and development servers would be in another room in the same building,
> belonging to a different company, and employees would have tokens on
> them, that would lock the workstation when disconnected from it.
>
> --
> Maxim Kammerer
> Liberté Linux:
http://dee.su/liberte