Quote from: Shannon on June 25, 2012, 03:37 pmQuote from: vlad1m1r on June 25, 2012, 03:31 pmThe "air gap" I was referring to was between an Android Device and your home computer - I appreciate this isn't the common understanding of the phrase, how would you best describe it? "Physical gap", "Air partition" - the point remains no fingerprints of browsing activity can remain on your home machine if you're using a different device altogether - even a technology Luddite like myself can see that. I also can't a conventional "cold boot attack" being effective against a tablet although the entire device can be encrypted.i'd describe it as just another device you do your stuff on, it offers no inherent security advantages or disadvantages versus using a different device that's configured properly (except for the inherent disadvantage of spreading your dirt across multiple devices). fwiw i would never use gpg on a device that has any sort of internet connectivity, that is proper airgap security since the only way to steal your shit from that device would be a SIGINT attack from outside your home, or a raid on your home.Remember my earlier quote:Like all revolutionary new ideas, the subject has had to pass through three stages, which may be summed up by these reactions: (1) 'It's crazy --- don't waste my time.' (2) 'It's possible, but it's not worth doing.' (3) 'I always said it was a good idea.' -- Arthur C. Clarke. "Next---The Planets!", Report on Planet Three. 1972So we're on to stage two now, all well and good, getting up there! :-)To clarify, what I had in mind was using a device solely for accessing SR - I agree that having your GPG private keys on a device with connectivity to the internet is a risk but do you have much of a choice unless you want to ferry encrypted data back and forth on a USB stick between devices? Wouldn't you need an extra device to do this in any case? I already mentioned the advantages of a conventional cold boot attack not being possible as far as I can see? I mean plugging in a USB stick with bootable OS wouldn't work against the full device encryption now available on tablets surely? A tablet would also be far easier to conceal and destroy than a laptop or home computer in the case of a raid. I also think a tablet wouldn't give off the same kind of EM emissions as a regular monitor/keyboard which could be picked up by the kind of SIGINT spying. There's also the fact it's far less susceptible to malware given that there's appreciably more viruses out there for other Operating Systems (admittedly that's changing!).There's also surely the advantage of portability - more so even than a laptop, with all the necessary functionality. I originally conceived this as an idea for people to check the balance of their wallet if buying BTC in cash but have since been persuaded that using such devices with 3G/Public Wifi is potentially dangerous.I'm also hoping to set the cost of these devices well below the price of acquiring another laptop or home computer.So to my count that's five advantages and one potential advantage i.e slightly higher resistance to malware due to smaller number of viruses that this would have over using a separate computer/laptop. Are we still at Stage two or can we move on to stage three yet? :-)V.