On 25/02/2008, Bill Moran <[EMAIL PROTECTED]> wrote:
> In response to "Igor Mozolevsky" <[EMAIL PROTECTED]>:
>
>  > Crypto is merely a way of obfuscating data, and we all know the truth
>  > about security by obscurity, right?
>
>
> I don't think you correctly understand the concept of "security through
>  obscurity" ... as crypto is _not_ an example of that.

You have way too much faith in crypto - any crypto system can be
broken given enough time + computing power + determinism... You can't
break a system when half the data that you need is missing (see *
later).

>  > Why would you have sensitive data
>  > on a laptop that anyone could potentially snatch out of your hand???
>  > If it's sensitive enough to be paranoid, it should never leave the
>  > site!
>
>
> That's like saying, "Why would you ever drive a car on the freeway when
>  you know how many people are killed in auto accidents every day."
>
>  The answer is, "because you must."

That's a ridiculous analogy! Such as when?..


>  > There are better ways to protect data than simple disk encryption, *if
>  > you really have to* to take it offsite on a laptop.
>
>
> Name 3.

1) Store the data on a USB stick, or other portable medium which you
can detach from the laptop*; or
2) Use crypto system that requires a physical token to decrypt the
data (which can be detached from the laptop in transit);

and I don't have time to think of a third one ATM...

>  > There's only one
>  > thing disk crypto is useful for - swap encryption, I'd not use
>  > straight crypto for anything else...
>
>
> Again, I find you opinions odd, and possibly misinformed.

How could it be misinformed - you've just said that HD crypto is easy
to compromise using the aforementioned method, clearly it's not good
enough to encrypt sensitive data?..

>  > But again, how many of us here
>  > actually use S/Key for remote logins?..
>
>
> S/Key isn't the magical solution to all security.

I know, I was merely using it as an example of security solution being
'out there' and hardly anyone using it...

>  > Then there's things like BIOS passwords,
>
>
> How does a BIOS password protect RAM from being removed?

Password protecting BIOS prevents the attacker from manipulating
permissible boot partitions...

>  > restricting
>  > boot partitions, and if you don't want memory covers to be unscrewed
>  > (or your laptop case as a whole, for that matter) you can always use a
>  > bit of loctite!
>
>
> Sure, the old "superglue in the USB port" trick.  I'm sure HW manufacturers
>  love it when they see that ... warranty out the door!  But in this case,
>  if the attacker is after the data, breaking the RAM door to get it open
>  isn't a very big deal, now is it?

Once the computer is off you only need to delay the extraction of RAM
sufficiently for the attack to be ineffective... And as for the
warranty, you have a choice, you either make the system secure and
compromise the warranty, or you make the system comply with warranty
T&C and compromise the security...

>  > As the saying goes, those who think that crypto is the solution to
>  > their problem, don't crypto nor the problem...
>
>
> Not sure I understand what you mean by that, but your flippant dismissal
>  of strong cryptography is not justified by any facts I've ever seen.

The issue is not how strong crypto is, but how people use it - if one
relies on the fact that their highly sensitive national secrets are
safe just because they've encrypted the hard drive the data is on, and
haven't taken any other precautions then you can easily see how a
simple attack like that would screw them over, and quite frankly they
would deserve it!.. Crypto is not a replacement for common sense!


Igor
_______________________________________________
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to