The feds probably had enough to convict even without his laptops' contents... But yeah, monitoring the environment is a solid idea, as is CPU <-> RAM encrypted pipeline. Internet access is usually the first thing that's cut. (Unless your attacker knows you use it as a trigger, or maybe possibly thought about using it as a trigger.) Travis On Feb 10, 2015 7:28 PM, "David Honig" <[1]dahonig@cox.net> wrote: A number of public reviews of DPR's infosec mistakes have been published. I think a strong solution to the 'tackled in library' defects would be to have: 1) program to notice his magic bracelet is not near 2) program to notice that vid cam is not a head but a chaotic scene #2 is particularly easy without extra hardware (ca. 2015) You'll have to switch it off when you visit the loo. And of course, things like 'back to wall facing forward' would have been helpful. Claustophilia is a useful trait. I wish to God these calculations could be done by a steam engine,” Babbage complained References 1. mailto:dahonig@cox.net