
2 Sep
2013
2 Sep
'13
8:30 a.m.
On Mon, 2013-09-02 at 17:45 +1000, Daniel Cross wrote:
I guess it depends on your threat model, so rewinding a bit - who are you wanting to prevent accessing your data? This greatly informs the conversation. The methods offered above, and in many of the replies thus far, assume a very sophisticated adversary.
Daniel
Let us assume that the adversary is not a three-letter-government-agency; not that I consent to three-letter-government-agencies accessing any of my information.