Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Say you store your private PGP-key on a air-gapped computer. When receiving a sensitive document you put in on a USB-drive, enter it to the air-gapped machine and then physically destroy the USB-drive. The air-gapped machine then directly presents the decryption on a monitor.

There definitely exist scenarios where the air-gapped machine to not have to both communicate out and in, but where only in is required.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: