at Monday, February 10, 2003 3:20 AM, Jim Choate
<[EMAIL PROTECTED]> was seen to say:
> On Sun, 9 Feb 2003, Sunder wrote:
>> The OS doesn't boot until you type in your passphrase, plug in your
>> USB fob, etc. and allow it to read the key. Like, Duh! You know,
>> you really ought to stop smoking c
On Sun, 9 Feb 2003, Jim Choate wrote:
> On Sun, 9 Feb 2003, Sunder wrote:
>
> > No shit Sherlock, that's the whole point!
>
> Actually it's not, the point is to stop the attacker in their tracks.
Sigh, I don't know why I'm bothering to write anything your clueless
way... he we go. We're guar
On Sun, 9 Feb 2003, Sunder wrote:
> No shit Sherlock, that's the whole point!
Actually it's not, the point is to stop the attacker in their tracks.
> The OS doesn't boot until you type in your passphrase, plug in your USB fob,
> etc. and allow it to read the key. Like, Duh! You know, you reall
On Mon, 10 Feb 2003, Dave Howe wrote:
> no, lilo is. if you you can mount a pgpdisk (say) without software, then you
> are obviously much more talented than I am :)
Bullshit. lilo isn't doing -anything- at that point without somebody or
something (eg dongle) being present that has the -plaintext
at Monday, February 10, 2003 3:09 AM, Jim Choate
<[EMAIL PROTECTED]> was seen to say:
> On Mon, 10 Feb 2003, Dave Howe wrote:
>> no, lilo is. if you you can mount a pgpdisk (say) without software,
>> then you are obviously much more talented than I am :)
> Bullshit. lilo isn't doing -anything- at t
No shit Sherlock, that's the whole point! The OS doesn't boot until you
type in your passphrase, plug in your USB fob, etc. and allow it to read
the key. Like, Duh! You know, you really ought to stop smoking crack.
--Kaos-Keraunos-Kybernetos---
+ ^ +
Jim Choate wrote:
> On Sun, 9 Feb 2003, Dave Howe wrote:
>
>> Jim Choate wrote:
>>> Yes, it can mount the partition. That isn't the problem. The problem
>>> is that for lilo to do this it has to have access to the key in
>>> plaintext. That makes the entire exercise moot.
>> not if you have to type
On Sun, 9 Feb 2003, Dave Howe wrote:
> Jim Choate wrote:
> > Yes, it can mount the partition. That isn't the problem. The problem
> > is that for lilo to do this it has to have access to the key in
> > plaintext. That makes the entire exercise moot.
> not if you have to type it every time.
Then
Jim Choate wrote:
> On Sat, 8 Feb 2003, Sunder wrote:
>> In real life this will not work as most Windoze hard disk encryption
>> schemes can't encrypt the OS disk - and this is where the temp/cache
>> stuff goes.
Not always - certainly, windows cache goes to a partition that must be
available at wi
On Sat, 8 Feb 2003, Sunder wrote:
> In real life this will not work as most Windoze hard disk encryption
> schemes can't encrypt the OS disk - and this is where the temp/cache stuff
> goes.
> These can have more than enough info to reveal what's on your crypto disk
> (ie. shortcuts to url's you'
On Sun, 9 Feb 2003, Dave Howe wrote:
> Jim Choate wrote:
> > Which is a blind path since those files -must- be unencrypted and if
> > they do mount the disk they have to have access to the key to
> > unencrypt the fs hence you're in the same boat as with Winblows.
> At least in theory a lilo bo
Jim Choate wrote:
> Yes, it can mount the partition. That isn't the problem. The problem
> is that for lilo to do this it has to have access to the key in
> plaintext. That makes the entire exercise moot.
not if you have to type it every time.
if you take that as criteria, then *all* encryption is
In real life this will not work as most Windoze hard disk encryption
schemes can't encrypt the OS disk - and this is where the temp/cache stuff
goes.
You can change both where your browser caches stuff off the web and the
temp folder so that's ok, but this doesn't work well because temp has to
be
At 09:34 AM 02/06/2003 -0500, Tyler Durden wrote:
I've got a question...
If you actually care about the NSA or KGB doing a low-level
magnetic scan to recover data from your disk drives,
you need to be using an encrypted file system, period, no questions.
OK...so I don't know a LOT about how PC
at Thursday, February 06, 2003 2:34 PM, Tyler Durden
<[EMAIL PROTECTED]> was seen to say:
> I've got a question...
>
>> If you actually care about the NSA or KGB doing a low-level
>> magnetic scan to recover data from your disk drives,
>> you need to be using an encrypted file system, period, no qu
On Thu, 6 Feb 2003, Tyler Durden wrote:
> Will this work for -everything- that could go on a drive? (In other words,
> if I set up an encrypted disk, will web caches, cookies, and all of the
> other 'trivial' junk be encrypted without really slowing down the PC?)
Depends on how well you build the
I've got a question...
If you actually care about the NSA or KGB doing a low-level
magnetic scan to recover data from your disk drives,
you need to be using an encrypted file system, period, no questions.
OK...so I don't know a LOT about how PCs work, so here's a dumb question.
Will this work
If you actually care about the NSA or KGB doing a low-level
magnetic scan to recover data from your disk drives,
you need to be using an encrypted file system, period, no questions.
There are occasional articles that pop up on the net talking
about somebody's improved capability for data recovery.
> From the OSI 7-layer model, which took it from the fact that the number 7 is
It's simpler than that. Russians wanted 6, americans 8.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.c
Thomas Shaddack <[EMAIL PROTECTED]> writes:
>Second, where did the number 7 really come from?
>From the OSI 7-layer model, which took it from the fact that the number 7 is
sacred to a certain tribe in Borneo (see "The Elements of Networking Style",
by Mike Padlipsky).
Peter.
-- Forwarded message --
Date: Tue, 04 Feb 2003 10:57:09 -0600
Subject: Putting the "NSA Data Overwrite Standard" Legend to Death...
From: Jonathan G. Lampe <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
OK, I'm sure this one will start a flame war, but...I work for a vendor
whose produc
21 matches
Mail list logo