Close
Results 1 to 10 of 16

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #11
    Official Thread Killer rbeau30's Avatar
    Join Date
    May 2011
    Location
    AURORA, CO
    Posts
    2,631

    Default

    1)
    With a good Cipher. However you must know the capabilities of the adversary you are protecting your information from.

    Consider reading:
    The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN-10: 0385495323

    It sounds like it is a hard read, but it is actually well written and I learned a lot, and helped me in my job.

    2)
    Consider a combination of different cells that could be cut off easily if problems arise. Also a good vetting program involving trustworthy persons, with concrete and non-negotiable requirements for joining.
    Last edited by rbeau30; 12-27-2012 at 20:44.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •