On Fri, 2010-07-02 at 09:16 -0500, Dustin Kirkland wrote:
On Thu, Jul 1, 2010 at 2:55 PM, Rob King jk...@deadpixi.com wrote:
Hello everyone,
Ubuntu's encrypted home directory feature is quite useful, and a good way
of increasing the security and privacy of information.
However,
Hello everyone,
Ubuntu's encrypted home directory feature is quite useful, and a good way
of increasing the security and privacy of information.
However, the scheme is a little leaky. Applications still use the
default system-wide temporary directory (/tmp), which is not encrypted. For
On Thu, Jul 1, 2010 at 2:55 PM, Rob King jk...@deadpixi.com wrote:
Hello everyone,
Ubuntu's encrypted home directory feature is quite useful, and a good way
of increasing the security and privacy of information.
However, the scheme is a little leaky. Applications still use the
default
Hi,
Dustin Kirkland kirkl...@canonical.com writes:
However, it's worth mentioning that /tmp is wiped on every boot in
Ubuntu. For this reason, I usually put my /tmp in a tmpfs in memory
(on systems where I have a few GB of memory). Add this line to your
/etc/fstab:
tmpfs /tmp tmpfs rw
On Fri, Jul 2, 2010 at 5:22 PM, Ansgar Burchardt ans...@43-1.org wrote:
Ubuntu. For this reason, I usually put my /tmp in a tmpfs in memory
(on systems where I have a few GB of memory).
[...]
This is not always true. Contents of a tmpfs can be swapped to disk[1]
and you might thus leak