69
69
to do. An attacker would have to physically disassemble the client
70
70
computer, extract the key from the initial RAM disk image, and then
71
71
connect to a *still online* Mandos server to get the encrypted key,
78
78
itself up completely, since Mandos servers are no longer running.
80
80
For sophisticated attackers who *could* do the clever thing, *and*