On 02/24/10 23:16, Ted Smith wrote:
On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote:
[]
Perhaps mention the benefits of TPM chips (on 'ix, they can be
configured to benefit the user, not some record company)?
Yup. Check out Trusted Grub if you're blessed with the appropriate
hardware.
On Thu, 2010-02-25 at 13:41 -0500, 7v5w7go9ub0o wrote:
On 02/24/10 23:16, Ted Smith wrote:
On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote:
[]
Perhaps mention the benefits of TPM chips (on 'ix, they can be
configured to benefit the user, not some record company)?
Yup. Check out
On 02/24/10 00:10, Ringo wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
One update that should be noted is that this doesn't protect against
bad nanny attacks. With full disk encryption, the boot partition isn't
encrypted (as you have to load it so it can ask for your passphrase and
On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote:
On 02/24/10 00:10, Ringo wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
One update that should be noted is that this doesn't protect against
bad nanny attacks. With full disk encryption, the boot partition isn't
encrypted
Good job!
IMHO this is a very nice paper; well written!
(Adjusted the title of this post a bit, in case the readers weren't
aware your goal )
(FWIW, some might want to read the paper - to gain a lot of insight and
background - and then download/test a copy of your (sanitized) .img
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
One update that should be noted is that this doesn't protect against
bad nanny attacks. With full disk encryption, the boot partition isn't
encrypted (as you have to load it so it can ask for your passphrase and
decrypt the rest of the drive). If the
It's running Qemu on an Ubuntu 9.04 server.
Ringo
7v5w7go9ub0o wrote:
Ringo wrote:
Hey Torizens,
I've set up another hidden service to test my virtual machine setup. My
new address is http://3rrf4fqicqwl7amf.onion and you can access drupal
(and create content) at
On Mon, 03 Aug 2009 16:42:57 -0400 Ringo 2600den...@gmail.com
wrote:
I posted a while ago saying I was making a how-to manual for newbies on
how to set up (reasonably) secure hidden services. I'm almost done but I
want to release my server for testing to see if I missed anything
obvious. This
For that matter, it's probably best *not* to run most kinds of hidden
services on tor relays precisely because tor relays are well known through
the directory. Running a hidden service on a client-only tor would be the
safest way because clients are not listed anywhere as such.
I actually
Hi Scott,
On Tue, Aug 4, 2009 at 10:26 AM, Scott Bennettbenn...@cs.niu.edu wrote:
For that matter, it's probably best *not* to run most kinds of hidden
services on tor relays precisely because tor relays are well known through
the directory. Running a hidden service on a client-only tor
I've tried a few times since you posted to reach this site, without success -
'Domain does not resolve'. Tor 0.2.1.18 is the client, and I can reach the
Hidden Wiki (on the second attempt at least).
GD
Date: Mon, 3 Aug 2009 16:42:57 -0400
From: 2600den...@gmail.com
To:
11 matches
Mail list logo