I think you're forgetting that Armory can be use, and should be used IMO, to create offline paper backups. Laminate a few of those suckers and store them in fireproof safes. If the the old computer you used, which may have had an active wallet on it, dies; then just grab another computer and one of your paper backups and your back in business.
Thank you for reminding me about another "attack vector" that I neglected.
You'll also need to store the Armory source code as well as the source code of its tangled mess of dependencies, including the toolsets required to rebuild them. Or just buy a life insurance policy and a performance bond on Mr. etotheipi.
Sorry, but I have a feeling that explaining certain long-term attack vectors will look to much like a personal attack. I really don't want to go into that discussion.
2112,
I know what you're saying: it's improper to talk about "zero attack-surface" because there's always a vulnerability due to one of the assumptions made which isn't necessary true (unexpected software on the OS, improper software design, maliciously modified software, etc). But what solution do you recommend instead? Both, "what do you do right now to secure your coins" and "how do you improve the software to make it more secure"?
I am not sure if there's anything better than Armory for the first question,
right now, in terms of being a solution that moderately-experienced users can use. The answer to the second question has been the topic of many discussions including
this one where I sought input from other users on exactly this topic. I don't see any posts from you.
(EDIT: added the correct link to the previous paragraph)You clearly have constructive input to add, so please do so on those threads. You are clearly very experienced and your input would be valuable so that stupid things don't happen. For reference, I am aware of various pre-installed tools for communicating via serial port -- and even IrDA could be used to initiate logins. I didn't mean to imply that all you need is a serial cable -- using the serial cable would come with a lockdown procedure. It would be for the really advanced users.
I heed your advice about claiming "zero attack vector", I should really be claiming that this is the "best solution currently available." It's certainly better than keeping an encrypted wallet on your online HDD.
P.S. -- One thing to clear up: paper backups for Armory are invaluable. You can print off multiple copies to protect against hardware failure, and any version of Armory can produce a raw list of private keys that could be imported into any other program. Agreed that old hardware is likely to fail, but new hardware fails too -- that's why there's such exhaustive backup features in Armory.