I wrote:
| Indeed, the classic question is I've just bought this new computer
| which claims to have full-disk encryption. Is there any practical
| way I can assure myself that there are (likely) no backdoors in/around
| the encryption?
|
| For open-source software encryption (be it swap-space,
On Jan 29, 2009, at 11:17 PM, Ivan Krstić wrote:
I'd find mobile e-mail just as useful if it went through a proxy
that stripped out _everything_ that's not plaintext. I open
attachments on my phone about once in a blue moon, and wouldn't miss
the ability if it were gone.
As a postscript,
Ben Laurie b...@links.org writes:
Apart from the obvious fact that if the TPM is good for DRM then it is also
good for protecting servers and the data on them,
In which way, and for what sorts of protection? And I mean that as a
serious inquiry, not just a Did you spill my pint? question. At
Perry, I couldn't possibly be the first to pass along today's XKCD,
could I?
http://xkcd.com/538/
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com