On Sat, 8 Feb 2003, Sunder wrote: > In real life this will not work as most Windoze hard disk encryption > schemes can't encrypt the OS disk - and this is where the temp/cache stuff > goes.
> These can have more than enough info to reveal what's on your crypto disk > (ie. shortcuts to url's you've recently visited, recently opened > documents, etc...) > > At least with a unixish OS you can mount your crypto file systems up at > boot time before the OS really starts up (before the system goes to > multi-user mode for example (at the end of /etc/rc1.d and before the > rc2.d init starts.) Which is a blind path since those files -must- be unencrypted and if they do mount the disk they have to have access to the key to unencrypt the fs hence you're in the same boat as with Winblows. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" [EMAIL PROTECTED] [EMAIL PROTECTED] www.ssz.com www.open-forge.org --------------------------------------------------------------------