On Thu, February 21, 2008 9:57 am, Joshua Penix wrote: > On Feb 20, 2008, at 11:12 PM, Tyrion wrote: > >> You are correct, if you have an encrypted drive, you have to use the passphrase to mount it, therefore, it is safe if "taken as evidence" > > Hah you wish... check this out: > http://www.wiebetech.com/products/HotPlug.php > > Video of it in action: > http://www.youtube.com/watch?v=erq4TO_a3z8 >
I didn't get how this pertained. But nemmine ... Let me describe my dream scenario. OK, 2 of 'em. 1. Bank SW: There is a table set for the tellers and an additional table set for the managers. A privileged log in un-greys the manager's menu. It can run 24/7 and nobody, including a guru, can get at the secure tables. If the machine is stolen, the data is still safe. 2. Amnesty International in a hostile country: The user has two log ons. As jsixpack, the encrypted drive isn't mounted and the app doesn't show its menus. As jcool, the drive is mounted and the data is available. The machine is powered up/down for use. There is a shutdown/umount switch on jcool's menu. If the door is kicked in, jcool pulls the plug out the back (did we all see the slashdot pointer to the Princeton study on how passphrases can be recovered from a cold machine up to 20 minutes after power down?). -- Lan Barnes SCM Analyst Linux Guy Tcl/Tk Enthusiast Biodiesel Brewer -- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
