On Thu, February 21, 2008 9:57 am, Joshua Penix wrote:
> On Feb 20, 2008, at 11:12 PM, Tyrion wrote:
>
>> You are correct, if you have an encrypted drive, you have to use the
passphrase to mount it, therefore, it is safe if "taken as evidence"
>
> Hah you wish... check this out:
> http://www.wiebetech.com/products/HotPlug.php
>
> Video of it in action:
> http://www.youtube.com/watch?v=erq4TO_a3z8
>

I didn't get how this pertained. But nemmine ...

Let me describe my dream scenario. OK, 2 of 'em.

1. Bank SW: There is a table set for the tellers and an additional table
set for the managers. A privileged log in un-greys the manager's menu. It
can run 24/7 and nobody, including a guru, can get at the secure tables.
If the machine is stolen, the data is still safe.

2. Amnesty International in a hostile country: The user has two log ons.
As jsixpack, the encrypted drive isn't mounted and the app doesn't show
its menus. As jcool, the drive is mounted and the data is available. The
machine is powered up/down for use. There is a shutdown/umount switch on
jcool's menu. If the door is kicked in, jcool pulls the plug out the back
(did we all see the slashdot pointer to the Princeton study on how
passphrases can be recovered from a cold machine up to 20 minutes after
power down?).

-- 
Lan Barnes

SCM Analyst              Linux Guy
Tcl/Tk Enthusiast        Biodiesel Brewer






-- 
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to