On Sat, 8 Feb 2003, Sunder wrote:

> In real life this will not work as most Windoze hard disk encryption
> schemes can't encrypt the OS disk - and this is where the temp/cache stuff
> goes.

> These can have more than enough info to reveal what's on your crypto disk
> (ie. shortcuts to url's you've recently visited, recently opened
> documents, etc...)
>
> At least with a unixish OS you can mount your crypto file systems up at
> boot time before the OS really starts up (before the system goes to
> multi-user mode for example (at the end of /etc/rc1.d and before the
> rc2.d init starts.)

Which is a blind path since those files -must- be unencrypted and if they
do mount the disk they have to have access to the key to unencrypt the fs
hence you're in the same boat as with Winblows.


 --
    ____________________________________________________________________

      We are all interested in the future for that is where you and I
      are going to spend the rest of our lives.

                              Criswell, "Plan 9 from Outer Space"

      [EMAIL PROTECTED]                            [EMAIL PROTECTED]
      www.ssz.com                               www.open-forge.org
    --------------------------------------------------------------------

Reply via email to