Hi,
NickJohnson wrote:Although from a security standpoint, the user of this software already has access to the machine anyway, so the machine is already effectively compromised. I also highly doubt it would work well against kernels that are compiled with different configurations and optimizations.
While that's a fairly common way of looking at things, I personally think that the industry can do better, and that the industry should do better (especially for mobile devices like laptops).
For an example, imagine if someone steals your laptop, then clears the CMOS to bypass the BIOS setup password, then boots your OS with something like Kon-Boot (or even just re-installs the OS). Now they've got your data; which could include things like your banking details, embarrassing pictures of yourself that you didn't want on the internet, etc. I know my computer has enough personal information on it to allow a fairly thorough identity theft, including account details and passwords for things like paypal...
Note: I know it's a bad idea to store passwords, etc; but a "secure" password is almost impossible to remember and therefore has to be written down somewhere (which makes me wonder if an insecure password that can be remembered would be more secure) 
.
Then there's businesses - things like trade secrets, client lists, etc. For an example, I know someone who sometimes has one of the laptops from his work, which includes confidential information for lots of people who receive government benefits. If this laptop got stolen it'd be a major privacy breach, and the company he works for could/would lose government contracts worth lots of $$$ (and they'd need to close down, because government contracts are the company's only income). In this particular case the data needs to be on a laptop because he travels (e.g. it can't be physically bolted down in a locked room that's protected by an alarm system).
Cheers,
Brendan