Fwd: Re: Fwd: Re: Question for app developers, like Enigmail etc. - Identicons
duane at nofroth.com
Mon Jun 12 23:50:20 CEST 2017
On 17-06-12 05:45 PM, Stefan Claas wrote:
> On 12.06.17 22:35, Robert J. Hansen wrote:
>>> Is there something like a Standard Operating Procedure for GnuPG
>>> available, which fulfills security experts demands, and which can
>>> easily be adapted by an average GnuPG user, regardless of platform
>>> and client he/she uses?
>> No. More to the point, there can't be. Each user faces threats
>> specific to that user; each user is responsible for their own threat
>> But follow the steps I outlined before and you'll significantly improve
>> your online security. You won't be perfect -- there is no such thing as
>> perfection. You won't be a hardened target -- that takes a lot of work.
>> But follow those steps and you'll have taken care of the easy ways that
>> your machine can be compromised.
> Thank you very much for your advise, much appreciated!
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
I'm not one of the many experts on the list you refer to so you'll have
to judge for yourself the usefulness of my procedures. Comments from
more experienced users welcome as well, of course, and some very
experienced users have given you very good advice already.
Some of things I do include setting a password on the BIOS and HD and
turning my computer off when I'm not using it. My reason for those
steps is that I am hoping it would introduce enough of a roadblock that
should someone gain physical access to my computer (a laptop) they would
need to take it with them in order to compromise it.
I also don't click on any links in emails. As well, I don't open any PDF
files I don't trust.
I believe also that it's important to consider what operating system you
use. Some people believe that with certain OSs you are compromised the
minute you install said OS and are actually fulfilling the role of
Mallory against yourself. This is to say that I believe Open Source is
beneficial not that it is the complete solution.
I would also add one word about USB sticks: It is very difficult to
know if they've been compromised and there are no tell-tale signs when
an attack is taking place. I never put a USB in my computer that has
been used on a computer I don't own.
duane at nofroth.com
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 455 bytes
Desc: OpenPGP digital signature
More information about the Gnupg-users