Apologies to those who've already seen this, but it was news to me:
Last month (Jun 2016), federal district judge Henry Coke Morgan, Jr[1] ruled
that the Fourth Amendment[2] does not protect home computers. A criminal
defendant has no reasonable expectation of privacy regarding an in-home
pers
Am 10. Jul, 2016 schwätzte Tom Roche so:
moin moin,
privacy is overrated, we should just mandate making all home walls out of
glass.
Maybe it's time to notch up the desktop security series to be a desktop
hardening series.
ciao,
der.hans
Apologies to those who've already seen this, but it w
good lucl getting a password out of me. If I had the option like I do on the
iPhone, I could set it up so that so many retries would erase the system. Most
machines today have the TPM unit on board, so that can be used. With enough
security in place, hacking or cracking just ceases to be worth t
It would appear that the defendant in this case is basically arguing
Heisenburg’s Uncertainty Principle is at play, in that the use of a trojan to
identify and spy on his machine may have resulted in the files they found there
to have come from unspecified sources, just because the trojan was pu
summary: desktop hardening, ¡sí! punting online privacy, ¡no!
details:
David Schwartz[1]
>> It would appear that the defendant in this case is basically arguing
>> Heisenburg's Uncertainty Principle is at play, in that the use of a trojan
>> to identify and spy on his machine may have resulted
I read it to be akin to not locking your front door so when the cops
come a calling they are legally able to walk in and search. Not so
today. The 4th Amendment still protects you from that (you leaving your
door unlocked).
They were talking about a computer. Used to be your rights stoppe
Anyone have sources on hardening a pixel? Can you auto encrypt data on Google’s
cloud? is it easy to make S3 a default drive? Have we ever done a workshop
about using Crouton or chrubuntu on a pixel? Since about 85% of all I do is web
work or ssh into a Linux server I really think I can get awa
well, I would recommend the use of pwgen and Ccrypt as interim measures. one
can generate passwords of a very high order strength with one and encrypt files
and folders (and even drive images) with the other. Nothing like good old
fashioned command line tools to offer security. :)
-eric of the