security by obscurity?you know, with a JTAG adapter and a bit of knowledge, one can read the onboard flash from those plugs too.so, probably a better approach is to have a system which doesn't expose your data when the disk is compromised. The simplest example is SSH with public key authentication and authentication forwarding (-A flag).