Head To Head
Log In
Register
U-Know! Forum »
Calling Grufty Jim (& the rest of you 2)
Log In to post a reply

60 messages
Topic View: Flat | Threaded
YerArseInParsley
365 posts

WHEN USED CORRECTLY AND SECURELY
Nov 11, 2002, 14:23
Whats the correct and secure procedure for use then? To deal with the problem of the key being coerced from one of the corressponts I'd suggest arranging a signal ( ie a set phrase in any messgae here) to warn your corresspondent that the key is compromised.
Bear in mind encypted data stands out amongst other traffic, it gets special attention. Even after applying encryption it should be easily possible to embed that file in an innocous file - use Camera/Shy to do that easily with image files if you can't code.

It is also possible to minimise the risk of key stroke grabbers being doing a clean install from a secure clean image. If you can afford it use an LCD screen as vdus can be read across the street if you don't provide them with heavy duty shielding ( lead from your local church roof seems appropriate).
Topic Outline:

U-Know! Forum Index