jaclaz, I agree, that is why I said it is kind of a drastic measure. I firmly believe that if an attacker has physical access to your device, you can pretty much assume that your data will be compromised one way or the other.
For a device being used in a corporate environment, this could have dire consequences. That's why it would be a good area to research some more effective security measures if a device is compromised.
↧