Careful, troll.
It takes one to know one!
So? That doesn't make LBE open-source software, does it, which is what I commented on?Mike is concerned with practical security against likely adversaries, so his reasons for using the software might be nuanced, depending on who he believes his adversary is. For example, his blog post https://grepular.com/Protecting_a_Laptop_from_Simple_and_Sophisticated_Attacks is pretty good about pointing out the need for differences in security with respect to multiple adversaries. It was fairly widely circulated.
_______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk