FWIW I distrust encrypted drives using hardware encryption. This came out
just a few days ago:
https://thehackernews.com/2018/11/self-encrypting-ssd-hacking.html: Flaws
in Popular Self-Encrypting SSDs Let Attackers Decrypt Data.
On Tue, Nov 6, 2018 at 10:15 PM Nicholas Papadonis <
nick.papadonis..
Ditto,
But don’t tell the Australian Government, it’s probably on their back door
request list…;)
> On 8 Nov 2018, at 01:26, Bear Giles wrote:
>
> FWIW I distrust encrypted drives using hardware encryption. This came out
> just a few days ago:
> https://thehackernews.com/2018/11/self-encry
Interesting. How about this for a start?
http://nickpapadonis.com/images-share/summerian-ancient-mesopotamia-ancient-lock.jpg
http://nickpapadonis.com/images-share/anunnaki1.jpg
http://nickpapadonis.com/images-share/summerian-Winged_Human-headed_Bulls.JPG
On Sun, Nov 4, 2018 at 7:21 PM open...@f
Hi Nick
Have You tried The FooKey Method ? https://foocrypt.net/the-fookey-method
Also,
I will be sourcing public addendum's as addendum's to my submission into the
Parliamentary Joint Committee on Intelligence and Security [
https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Intel
Try openssl cms ( as newer alternative to s/mime)
пт, 2 нояб. 2018 г. в 23:30, Nicholas Papadonis :
>
> Security Experts,
>
> I'm considering encrypting a tar archive and optionally a block file system
> (via FUSE) using either utility. Does anyone have comments on the best
> practices and tools
> From: openssl-users on behalf of Nicholas
> Papadonis
> Sent: Friday, November 2, 2018 14:29
> I read
Where? It's hard for us to determine the quality of your source, or your
interpretation of it, if we don't know what it is.
> that the OpenSSL AES-CBC CLI mode is prone to a malleable atta