On 01/02/2012 08:10 PM, Chris O'Connell wrote:
The password used to decrypt the disk and log in to Windows is the same.
Thus the process is more transparent for users. Instead of having to
enter two (sometimes unrelated) passwords with Truecrypt, BitLocker users
only enter one password.
Same
On Mon, 2 Jan 2012, Tom Metro wrote:
The EFF recently tweeted
(http://twitter.com/#!/EFF/status/153306301965938688):
@EFF
Call to action for 2012: full disk encryption on every machine you
own! Who's with us? eff.org/r.3Ng
Which links to this article:
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss-
bounces+blu=nedharvey@blu.org] On Behalf Of Jim Gasek
there is a performance
hit.
There may be a performance hit in some situations, but not on modern or
decent computers with decent encryption. I have two points to
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss-
bounces+blu=nedharvey@blu.org] On Behalf Of Chris O'Connell
ALSO, NO FULL DISK ENCRYPTION should ever be used on an SSD drive.
Performance will drop by 30% and the drive's wear-leveling system and
TRIM
won't function
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss-
bounces+blu=nedharvey@blu.org] On Behalf Of Tom Metro
What makes Microsoft BitLocker better than TrueCrypt?
Each is better in its own way.
Bitlocker is better if you're an IT person who wants to protect your
internal users
A couple of more supporting links regarding TRIM and wear-leveling (from
Truecrypt):
http://www.truecrypt.org/docs/?s=trim-operation
http://www.truecrypt.org/docs/?s=wear-leveling
On Tue, Jan 3, 2012 at 12:21 PM, Chris O'Connell omegah...@gmail.comwrote:
That has not been my experience at all.
i must have missed something in my latest installation of
ubuntu 11.10; libreoffice no longer seems to open doc
files.
any suggestions welcome.
tia,
ole dan
j. daniel moylan
84 harvard ave
brookline, ma 02446-6202
617-232-2360 (tel)
j...@moylan.us
www.moylan.us
[death to html bloat!]
From: Chris O'Connell [mailto:omegah...@gmail.com]
(snipped and moved top post to bottom)
On Tue, Jan 3, 2012 at 12:07 PM, Edward Ned Harvey b...@nedharvey.com
wrote:
ALSO, NO FULL DISK ENCRYPTION should ever be used on an SSD drive.
Performance will drop by 30% and the drive's
From: Chris O'Connell [mailto:omegah...@gmail.com]
http://www.truecrypt.org/docs/?s=trim-operation
Given: Truecrypt permits TRIM. And if you TRIM, an attacker may be able
to identify some information, such as degrading your plausible deniability
in some cases, or something like that.
Perhaps the use of the word NEVER is too strong or misleading. From
personal experience I can say that given the performance decrease using
TrueCrypt on an SSD drive I would never encrypt an SSD drive using
TrueCrypt. I haven't tried BitLocker on an SSD drive yet.
You have really proven your
Bill Horne wrote:
Oa k'wala wrote:
Any thoughts on the kind of security risk I might be vulnerable to
because I only encrypt my home dir as opposed to the full disk?
Many applications use /tmp or /var files as working storage, and they
leave ghosts behind.
As does swap.
-Tom
--
Tom
Richard Pieri wrote:
On Jan 2, 2012, at 7:55 PM, Tom Metro wrote:
What makes Microsoft BitLocker better than TrueCrypt?
... because it protects against more attack modes than other software.
Granted, I was being lazy by asking the question rather than looking it
up, but repeating the quote I
Richard Pieri wrote:
Tom Metro wrote:
Are you using full disk encryption?
I don't. I take care of my gear. I made this statement before: I
see WDE as enabler for carelessness.
The EFF article I quoted references a prior EFF article on border
crossing inspections. The encouragement to
Daniel Feenberg wrote:
The built-in Fedora encryption is no trouble to establish...
What tool do they use? Any other distributions that provide an
integrated solution?
-Tom
--
Tom Metro
Venture Logic, Newton, MA, USA
Enterprise solutions through open source.
Professional Profile:
Richard Pieri wrote:
And this is the great big rub with WDE: backups. File-level backups
are decrypted when sent to the backup system unless the backup system
itself re-encrypts everything.
I'm not sure I see the big problem with backups, unless you simply find
file-level backups undesirable
Stephen Adler wrote:
I didn't know there was a hardware hacking list, I'll sign up!
Yup. More info here:
http://blu.wikispaces.com/Hardware+Hacking
And for anyone else who has gotten some new toys for Christmas - like a
new iPhone and you want to hack Siri, a new Android phone you want to
root,
Richard Pieri wrote:
And this is the great big rub with WDE: backups. File-level backups
are decrypted when sent to the backup system unless the backup system
itself re-encrypts everything.
Generalizations galore! ;-)
I suppose that depends on your choice of backup software, now doesn't
Don't get me wrong, I love truecrypt. But their documentation is ... well
... sort of crazy. This is the toned down version of saying they're
totalitarian extremist and elitist, to the point of being coercive and
misleading to innocent civilians in order to drive some sort of self-serving
On Tue, 3 Jan 2012, Tom Metro wrote:
Daniel Feenberg wrote:
The built-in Fedora encryption is no trouble to establish...
What tool do they use? Any other distributions that provide an
From
http://fedoraproject.org/wiki/Implementing_LUKS_Disk_Encryption#Introduction_to_LUKS
On Jan 3, 2012, at 9:09 AM, Kyle Leslie wrote:
One of the huge benefits I think is that the encryption keys/recovery keys
can be stored in AD. So that if you need to unlock or change the drives
around you don't need to have the user store that some place to get
lost/stolen. It stores in AD
On Tue, Jan 3, 2012 at 5:01 PM, Tom Metro tmetro-...@vl.com wrote:
...
Daniel Feenberg wrote:
I don't see much point in encrypting data on a network server - if the
disk is mounted then the plain-text is available to an intruder and the
addition of an encrypted version doesn't enhance
21 matches
Mail list logo