One Laptop Per Terrorist

stef s at ctrlc.hu
Tue Mar 31 08:07:35 PDT 2015


On Mon, Mar 30, 2015 at 11:20:47PM -0700, coderman wrote:
> two USB Armory not so large nor overkill. perhaps... :P
>   http://www.inversepath.com/usbarmory.html

this device - if unmodified - has severe limitations regarding inputs. e.g. if
the armory contains some key material, it's hard to have it stored in there in
a ciphertext, the only way to unlock (provide a decryption key for the
ciphertext inside) it currently is from the device you compartmentalize your
keys from, the host. there's a thing that is however extremely cool in this
device, the arm trustzone (cue the sad violinist while the TCM jamboree slides
are shown). pity that this gets so far ignored.

it's a neat but quite misunderstood device i think.

-- 
otr fp: https://www.ctrlc.hu/~stef/otr.txt



More information about the cypherpunks mailing list