Smart card

Robert J. Hansen rjh at sixdemonbag.org
Mon Apr 10 05:25:06 CEST 2017


> I think this is being confounded by adjoining two conversations---that
> smartcards provide additional security given a compromised system, and
> the satirical quote your provided.  I was referring in this case to the
> latter.

If you send or receive sensitive communications from a compromised
endpoint, you're screwed.  The smartcard will not save you.  It can't.

When I hear people talk about how the smartcard will keep their keys
safe even after a system compromise, I hear that as being like a
survivalist talking about how great it is his tiny bomb shelter will
keep his seeds safe after a direct hit from a nuclear bomb.  Great, I'm
very happy for you, but you're giving *terrible* advice to people who
are worried about the bomb dropping.  Even encouraging them to move
somewhere that's not a high-priority target for a nuclear strike, as
impractical as that advice is, is better.

> My point is that if you base your entire threat model and practices on
> the fact that some attacker somewhere is going to succeed in a targeted
> attack against you, then you may as well give up on security period.

If your threat model includes Tier-1 actors, you're gonna get Mossaded.

You.  Cannot.  Win.

Therefore, any threat model that assumes you're the target of Tier-1
interest is inherently -- I'll say it again -- screwed.  Once you become
a target of Tier-1 interest it's all over.

Don't come to their attention.  And don't mislead newbies by making them
think they can win against Tier-1s, either.

> You seem to be suggesting that key safety isn't even a concern if you're
> compromised---that nothing else matters, and the distinction between a
> compromise as you described with or without access to the key(s) is
> irrelevant.

You seem to think that your bomb shelter surrounded by five hundred
meters of radioactive fused glass is somehow a win.  After all, your
keys are safe, right?

Preserve the security of your endpoint system.  Nothing else will do.



More information about the Gnupg-users mailing list