rolling Firefox back to 2.x
Dotan Cohen
dotancohen at gmail.com
Wed Sep 3 17:14:47 UTC 2008
2008/9/3 Nik N <niknot at gmail.com>:
> From someone who did not monitor the network beforehand, has the
> physical possession of the computer some time (days, at least many
> hours) after it was last powered down (nobody is busting doors here),
> and might be inclined to spend tens of thousands of dollars...
That is the technical threat, which the list should consider.
You may want to consider welding the computer to the floor. That's not
a joke: I've seen it done before. Then ensure that the case is secure
enough that the hard drive cannot be removed easily.
> to weasel
> out of a contract worth a couple of millions; and would succeed if he
> can make a claim about sites visited using a browser on that computer,
> that would stand in the court of law. If there is any encrypted data on
> that computer, he could get a civil 'duces tecum' decryption key
> subpoena; and if the key was not produced, he would likely win the
> case by default.
In addition to the technical side of the problem that we are dealing
with here, you may want to explore your legal options regarding stolen
material standing up as evidence in the courts of your country.
--
Dotan Cohen
http://what-is-what.com
http://gibberish.co.il
א-ב-ג-ד-ה-ו-ז-ח-ט-י-ך-כ-ל-ם-מ-ן-נ-ס-ע-ף-פ-ץ-צ-ק-ר-ש-ת
ä-ö-ü-ß-Ä-Ö-Ü
More information about the ubuntu-users
mailing list