<br><br><div><span class="gmail_quote">On 10/4/06, <b class="gmail_sendername">Dissent</b> <<a href="mailto:Dissent@pogowasright.org">Dissent@pogowasright.org</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
‰ Of each missing device, the date they became missing, their last<br>known geographic location, and which ones were encrypted.</blockquote><div><br>See, here's a slippery slope - full disk encryption or data? And what data was encrypted and what was not?
<br>I also would have asked for the OS type and version as well as the authentication - password (single factor) or <br>plus token (multiple factor).<br><br>But this is a good first start. The spokespersons for these agencies always seem to say vague things like "analysis shows the data was not accessed", "the data was encrypted", "the computer had a password" etc. This should give us more accountability at least on the government side.
<br></div></div><br>