On Fri, 13 Feb 2009 19:30, em...@sven-radde.de said: > "They" will have difficulties installing a keylogger if the unencrypted > /boot is always in your pocket and the HDD contains just encrypted > gibberish.
They will use a hardware logger and don't care about any encrypted stuff in your pocket. Anyway, for your example: Who will execute the code to decrypt boot? What about another boot manager or a rogue BIOS or a complete virtualized machine? Please repeat with me: There is no way to avoid or detect backdoors if physical access to the machine has ever been granted. Well, in theory you can detect a backdoor, but you need quite some equipment which certainly won't fit into a small pocket. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users