From 950873b60cf220264d6d2481d9abc966e8b1bdc6 Mon Sep 17 00:00:00 2001 From: Lars Wirzenius Date: Thu, 9 May 2019 18:11:28 +0300 Subject: Drop: bullet point that's duplice of moderation slide --- pgptalk.mdwn | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/pgptalk.mdwn b/pgptalk.mdwn index a8aaa72..a77ff59 100644 --- a/pgptalk.mdwn +++ b/pgptalk.mdwn @@ -131,16 +131,12 @@ Basics of public key cryptography Storing keys securely ============================================================================= -* Consider your threat models: what do you need to protect against +* Consider your threat models: what do you need to protect against? * You should probably at least keep your main key pair off-line, on a USB stick, and only use it in a device whose security you trust -* This can be taken into extremes, if the threat model warrants it - - * Be careful you're not so secure you don't use crypto at all - * Subkeys can be stored on your normal devices, since they're easy to replace with new ones if they're compromised -- cgit v1.2.1