Run OS X in a virtual machine. Under Windows, Linux, or OS X itself.
"Don't meet me at the 5:10pm train and don't pick up my shirts at the laundry." Neat, huh?
Don't keep us in suspense. Aren't you going to decrypt that for us?
KM: You send me yours along with the IP address, and I'll tell you mine. Good try at information reconnaissance.
Oh please. The poor fanboy just wanted to have the same setup you are using. From your visit to Atlanta in 2008:
"In his luggage, they found a MacBook Pro, a Dell XPS M1210 laptop, an Asus 900 mini-laptop, three or four hard drives, numerous USB storage devices, some Bluetooth dongles, three iPhones, and four Nokia cell phones (with different SIM cards for different countries).
They also found a lock-picking kit and an HID proximity card spoofer that can be used to snag data stored on physical access cards by swiping it in front of them. The data can then be used to enter locked doors without having to make a forged access card. Mitnick says he used the device in a demonstration about security in his speech in Bogota, but that the customs agents' eyes lit up when they saw it, thinking it was a credit card reader.
(Source: Kevin Mitnick Detained in Atlanta for having computer equipment on flight)
If you fall from 30,000 feet, ignoring air resistance, you'd hit the ground in 43 seconds. I'm guessing air resistance would make that closer to 75 seconds. Not what I'd call "long dead before you hit the ground" as the summary suggests.
Yes indeed, why bother to read anything when you can assume that any cynical thing that pops into your head is correct.
The private key can fit on a cheap usb thumb drive, or even a piece of paper. You can put a copies of your key in your safe-deposit box, at your friends' houses, at your relatives houses, at your work and home. The key doesn't change frequently, so you aren't driving around swapping media.
Even bytes get lonely for a little bit.