Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Travel with notebook habit

Steve Weis steveweis at
Thu Dec 27 17:12:23 PST 2012

I recommend using full disk encryption and fully powering down at minimum.
You should set a BIOS password, disable booting from network or removable
media, and enable IOMMU.

I would also use a verifiable boot sequence, but that's not easy to

Keep in mind there are still many attack vectors if someone gets physical
access to your machine. Someone can always force you to log in as well.

It is safer to have nothing incriminating in your possession at all. If
connectivity allowed, I'd run a remote VM and use the laptop as a dumb,
stateless terminal.

(Disclaimer: I'm working on a commercial solution to the physical attack
On Dec 27, 2012 1:59 PM, "Jerzy Łogiewa" <jerzyma at> wrote:

> I am just reading this,
> Can we start some discussion about good notebook travel habit? I have read
> Jacob Appelbaum say he does not travel with _ANY_ drive in notebook, and
> this seem to be extreme.
> Without removing drive, what is the best habit for FDE for prevent attacks
> as Schneier describe? Full power-down? No hibernate file? Any other things?
> --
> Jerzy Łogiewa -- jerzyma at
> --
> Unsubscribe, change to digest, or change password at:
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the liberationtech mailing list