You're assuming that the drive is going to be booted off of, instead of
copied and analized. If I just have a binary image of a drive, I can grep
for n entropy of l bits (l being a hash of say 40, 128...4096) in length,
yielding all potential keypairs on the volume. This requires no login.
They can even just slave the drive in another machine specifically
designed to do this.
might only take a half hour or less.
tack
On Wed, 26 Sep 2001, Erik Curiel wrote:
>
> My private key is password protected. In order for it to be used to
> decode my encrypted crap, someone would first have to crack the password.
> This, I grant you, is not so difficult as decoding encrytped messages
> themselves, but it's still no piece of cake.
>
> E
>
>
> On 26 Sep 2001, John Hunter wrote:
>
> > >>>>> "Erik" == Erik Curiel <[EMAIL PROTECTED]> writes:
> >
> > Erik> All your data will still be sitting in plaintext on your
> > Erik> computer when all's said and done, waiting for any FBI/ATF
> > Erik> sucker to swoop in and snag it.
> >
> > Yeah but so what, so is your private key, right? Or are you hard core
> > enough to keep it separate?
> >
> > JDH
> >
> >
> >
>
>
--
------------------------------------------
1st Amendment: Void where prohibited
http://freesklyarov.org
http://www.anti-dmca.org