On 1/3/2012 11:56 PM, Bill Bogstad wrote:
I just heard about a company selling
a product to maintain power on seized computers while you transport
them:
http://www.wiebetech.com/products/HotPlug.php
It came up in the context of moving servers from one power jack to
another one due to data
On 1/3/2012 10:32 PM, Tom Metro wrote:
Ummm...yeah. You do realize that in order to use your data you need to
decrypt it, right? :-)
Yeah, but that data remains local within hopefully protected memory
areas. Bacukps usually run to external storage of some sort, be they
flash drives or NAS
On 01/03/2012 08:50 AM, Daniel Feenberg wrote:
The built-in Fedora encryption is no trouble to establish (just check
the box during installation) and maintain and on a multi-core desktop
does not affect performance. An update from Fedora 13 to 16 did damage
the boot record and make the disk
On Wed, Jan 04, 2012 at 09:24:47AM -0500, Bill Horne wrote:
Anyone buying this device would do well to have paid-up life insurance:
the company is selling a UPS, but they're also selling cheater cords
that allow their UPS to power a live outlet with a double-male
connection cord, and that's
On 01/03/2012 11:46 PM, Eric Chadbourne wrote:
gpg, virtualbox and /home encryption. only santa knows what i'm doing
and he doesn't care.
...because you're permanently on the naughty list? :-P
___
Discuss mailing list
Discuss@blu.org
On Wed, Jan 4, 2012 at 1:39 PM, Ben Eisenbraun b...@klatsch.org wrote:
On Wed, Jan 04, 2012 at 09:24:47AM -0500, Bill Horne wrote:
Anyone buying this device would do well to have paid-up life insurance:
the company is selling a UPS, but they're also selling cheater cords
that allow their UPS
Starts sounding like it might be best to get a system like
off-the-grid folks have,
where they run inverters full time from batteries, and charge the batteries
from whatever is available (PV solar, generators, wind, tractor/generators,
steam engine/generators, or even just charger from the grid,
On 01/04/2012 04:23 PM, Daniel Feenberg wrote:
On Wed, 4 Jan 2012, Matthew Gillen wrote:
On 01/03/2012 05:03 PM, Tom Metro wrote:
Daniel Feenberg wrote:
The built-in Fedora encryption is no trouble to establish...
What tool do they use? Any other distributions that provide an
integrated
On Jan 4, 2012, at 1:31 PM, Matthew Gillen wrote:
Fedora allows you to do whole partition/volume encryption with the installer
very easily.
Fedora does so using dm-crypt/LUKS which can encrypt arbitrary block devices.
Fedora provides the option to encrypt entire disks or individual
On Wed, 4 Jan 2012, Matthew Gillen wrote:
On 01/04/2012 04:23 PM, Daniel Feenberg wrote:
On Wed, 4 Jan 2012, Matthew Gillen wrote:
On 01/03/2012 05:03 PM, Tom Metro wrote:
Daniel Feenberg wrote:
The built-in Fedora encryption is no trouble to establish...
What tool do they use? Any
On 01/02/2012 08:10 PM, Chris O'Connell wrote:
The password used to decrypt the disk and log in to Windows is the same.
Thus the process is more transparent for users. Instead of having to
enter two (sometimes unrelated) passwords with Truecrypt, BitLocker users
only enter one password.
Same
On Mon, 2 Jan 2012, Tom Metro wrote:
The EFF recently tweeted
(http://twitter.com/#!/EFF/status/153306301965938688):
@EFF
Call to action for 2012: full disk encryption on every machine you
own! Who's with us? eff.org/r.3Ng
Which links to this article:
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss-
bounces+blu=nedharvey@blu.org] On Behalf Of Jim Gasek
there is a performance
hit.
There may be a performance hit in some situations, but not on modern or
decent computers with decent encryption. I have two points to
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss-
bounces+blu=nedharvey@blu.org] On Behalf Of Chris O'Connell
ALSO, NO FULL DISK ENCRYPTION should ever be used on an SSD drive.
Performance will drop by 30% and the drive's wear-leveling system and
TRIM
won't function
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss-
bounces+blu=nedharvey@blu.org] On Behalf Of Tom Metro
What makes Microsoft BitLocker better than TrueCrypt?
Each is better in its own way.
Bitlocker is better if you're an IT person who wants to protect your
internal users
A couple of more supporting links regarding TRIM and wear-leveling (from
Truecrypt):
http://www.truecrypt.org/docs/?s=trim-operation
http://www.truecrypt.org/docs/?s=wear-leveling
On Tue, Jan 3, 2012 at 12:21 PM, Chris O'Connell omegah...@gmail.comwrote:
That has not been my experience at all.
From: Chris O'Connell [mailto:omegah...@gmail.com]
(snipped and moved top post to bottom)
On Tue, Jan 3, 2012 at 12:07 PM, Edward Ned Harvey b...@nedharvey.com
wrote:
ALSO, NO FULL DISK ENCRYPTION should ever be used on an SSD drive.
Performance will drop by 30% and the drive's
From: Chris O'Connell [mailto:omegah...@gmail.com]
http://www.truecrypt.org/docs/?s=trim-operation
Given: Truecrypt permits TRIM. And if you TRIM, an attacker may be able
to identify some information, such as degrading your plausible deniability
in some cases, or something like that.
Perhaps the use of the word NEVER is too strong or misleading. From
personal experience I can say that given the performance decrease using
TrueCrypt on an SSD drive I would never encrypt an SSD drive using
TrueCrypt. I haven't tried BitLocker on an SSD drive yet.
You have really proven your
Bill Horne wrote:
Oa k'wala wrote:
Any thoughts on the kind of security risk I might be vulnerable to
because I only encrypt my home dir as opposed to the full disk?
Many applications use /tmp or /var files as working storage, and they
leave ghosts behind.
As does swap.
-Tom
--
Tom
Richard Pieri wrote:
Tom Metro wrote:
Are you using full disk encryption?
I don't. I take care of my gear. I made this statement before: I
see WDE as enabler for carelessness.
The EFF article I quoted references a prior EFF article on border
crossing inspections. The encouragement to
Daniel Feenberg wrote:
The built-in Fedora encryption is no trouble to establish...
What tool do they use? Any other distributions that provide an
integrated solution?
-Tom
--
Tom Metro
Venture Logic, Newton, MA, USA
Enterprise solutions through open source.
Professional Profile:
Richard Pieri wrote:
And this is the great big rub with WDE: backups. File-level backups
are decrypted when sent to the backup system unless the backup system
itself re-encrypts everything.
I'm not sure I see the big problem with backups, unless you simply find
file-level backups undesirable
Richard Pieri wrote:
And this is the great big rub with WDE: backups. File-level backups
are decrypted when sent to the backup system unless the backup system
itself re-encrypts everything.
Generalizations galore! ;-)
I suppose that depends on your choice of backup software, now doesn't
On Tue, 3 Jan 2012, Tom Metro wrote:
Daniel Feenberg wrote:
The built-in Fedora encryption is no trouble to establish...
What tool do they use? Any other distributions that provide an
From
http://fedoraproject.org/wiki/Implementing_LUKS_Disk_Encryption#Introduction_to_LUKS
On Jan 3, 2012, at 9:09 AM, Kyle Leslie wrote:
One of the huge benefits I think is that the encryption keys/recovery keys
can be stored in AD. So that if you need to unlock or change the drives
around you don't need to have the user store that some place to get
lost/stolen. It stores in AD
On Tue, Jan 3, 2012 at 5:01 PM, Tom Metro tmetro-...@vl.com wrote:
...
Daniel Feenberg wrote:
I don't see much point in encrypting data on a network server - if the
disk is mounted then the plain-text is available to an intruder and the
addition of an encrypted version doesn't enhance
The EFF recently tweeted
(http://twitter.com/#!/EFF/status/153306301965938688):
@EFF
Call to action for 2012: full disk encryption on every machine you
own! Who's with us? eff.org/r.3Ng
Which links to this article:
:
From: Tom Metro tmetro-...@vl.com
To: L-blu discuss@blu.org
Subject: [Discuss] Full disk encryption
Date: Mon, 02 Jan 2012 19:55:34 -0500
The EFF recently tweeted
(http://twitter.com/#!/EFF/status/153306301965938688):
@EFF
Call to action for 2012: full disk encryption on every machine you
own
-...@vl.com wrote:
From: Tom Metro tmetro-...@vl.com
To: L-blu discuss@blu.org
Subject: [Discuss] Full disk encryption
Date: Mon, 02 Jan 2012 19:55:34 -0500
The EFF recently tweeted
(http://twitter.com/#!/EFF/status/153306301965938688):
@EFF
Call to action for 2012: full disk encryption
On Jan 2, 2012, at 7:55 PM, Tom Metro wrote:
What makes Microsoft BitLocker better than TrueCrypt?
... because it protects against more attack modes than other software.
Are you using full disk encryption? If so, what tool are you using?
I don't. I take care of my gear. I made this
What makes Microsoft BitLocker better than TrueCrypt?
I've used TrueCrypt; no experience w/ BitLocker.
Are you using full disk encryption? If so, what tool are you using?
I use Ubuntu which allows encryption of the home directory. I keep all of my
personal/sensitive stuff in the home
On 1/3/2012 12:16 AM, a k'wala wrote:
Any thoughts on the kind of security risk I might be vulnerable to
because I only encrypt my home dir as opposed to the full disk?
Many applications use /tmp or /var files as working storage, and they
leave ghosts behind.
Bill
--
Bill Horne
33 matches
Mail list logo