Yes, you are quite right on this one. But with our total connectedness these days, via wifi and cell phone and other means of wireless communication. I dont think people will give this up. However with some government organisations needing security say Military and Intelligence as well as others this is totallly necessary. Some organisations use a computer that is used for the public internet consumption that is obviously connected to the internet. Interestingly the countries which map these computers can be rather interesting. Jeremy Compton Date: Mon, 2 Jun 2014 08:24:09 +0100 From: capricorn8159@xxxxxxxxx To: cryptome@xxxxxxxxxxxxx Subject: [cryptome] Re: TrueCrypt compromised Tor a computer to be truly air gapped the following conditions must be satisfied. 1) the computer must at no time have been connected to the internet. 2) be devoid of any means of wirelessly connecting to the internet. 3) have full disk encryption by default. 4) be devoid of any monitoring capability( no microphone , no built in camera. remember blue tooth is vulnerable so it should not be present either.). However , since the air gap methodology is now widely known computer manufacturers are likely to be put under pressure to"net test" their products prior to dispatch. in other words, learn to build a computer from scratch or find someone who can.. ideally someone you can trust implicitly. I think that satisfies the question as to what an airgappe computer is.. On 02/06/2014 06:45, In Harms Way wrote: Please, Ryan Carboni, kindly explain, what you mean by "Airgap encryption". Airgap as method to keep certain data on computers safe by keeping them off the net is broken; the "airgap browser" is not (yet?) available for consumers and an encryption algorithm called "airgap" is not existing to my knowledge. Did I miss something? Ryan Carboni wrote, On 31/05/2014 11:17: Airgap encryption. On Fri, May 30, 2014 at 11:13 PM, In Harms Way <11414150173@xxxxxxxxxx> wrote: Now serious: Which open-source programme for container-encryption of all files and disks the professionals like medical doctors, lawyers, priests et. al. still can use to fulfil their legal obligation to store patient or client data 100% secure ???? To my understanding PGP encryption with UCE (only user has the private key - private key not grabbed by any webmail etc.) for e-mails (e.g. via Thunderbird and enigmail) is still not broken (if user disabled hibernation on his/her machine to avert pass-phrase stealing from the hibernation dump). But which other truecrypt-like open-source programme still stands strong for file/disk-encryption.? Any suggestions? Shaun O'Connor wrote, On 30/05/2014 12:06: got to agree on that point and tails 1.0 was only released recently too!! On 30/05/2014 00:14, tpb-crypto@xxxxxxxxxxx wrote: Message du 29/05/14 19:49 De : "Jean-Philippe DÃ©carie-Mathieu" Oh, I'm nowhere near giving up. I'm aware of the alternatives; it's just that this whole TC story is obscure as hell. Still no words from the developer(s)... It's gotta suck for Tails and other projects that have integrated TC also. Other projects will not be affected. That's the nature of open source, you close a door, a window opens. Those interested will keep truecrypt alive, it just takes interest. . -- https://www.resetthenet.org/ On June 5 2014, this email addrfess will NOT be accepting any mails....are you in? -- We have nothing to hide, but something to protect: LIBERTY, PRIVACY & FREEDOM - and the people, whose human rights these are. -- We have nothing to hide, but something to protect: LIBERTY, PRIVACY & FREEDOM - and the people, whose human rights these are. -- https://www.resetthenet.org/ On June 5 2014, this email addrfess will NOT be accepting any mails....are you in?