That's a good point.

E

On Wed, 26 Sep 2001, tack wrote:

> You're assuming that the drive is going to be booted off of, instead of
> copied and analized.  If I just have a binary image of a drive, I can grep
> for n entropy of l bits (l being a hash of say 40, 128...4096) in length,
> yielding all potential keypairs on the volume.  This requires no login.
> They can even just slave the drive in another machine specifically
> designed to do this.
>
> might only take a half hour or less.
>
> tack
>
> On Wed, 26 Sep 2001, Erik Curiel wrote:
>
> >
> > My private key is password protected.  In order for it to be used to
> > decode my encrypted crap, someone would first have to crack the password.
> > This, I grant you, is not so difficult as decoding encrytped messages
> > themselves, but it's still no piece of cake.
> >
> > E
> >
> >
> > On 26 Sep 2001, John Hunter wrote:
> >
> > > >>>>> "Erik" == Erik Curiel <[EMAIL PROTECTED]> writes:
> > >
> > >     Erik> All your data will still be sitting in plaintext on your
> > >     Erik> computer when all's said and done, waiting for any FBI/ATF
> > >     Erik> sucker to swoop in and snag it.
> > >
> > > Yeah but so what, so is your private key, right?  Or are you hard core
> > > enough to keep it separate?
> > >
> > > JDH
> > >
> > >
> > >
> >
> >
>
>

-- 

Erik Curiel
Sometime Web Engineer/Almost Philosopher

"sheepdog       standing in the rain
bullfrog        doing it again

some kind of happiness
is measured out in miles

what makes you think you're something special
when you smile


childlike       no one understands
jack knife      in your sweaty hands

some kind of innocence
is measured out in years

you don't know what it's like
to listen to your fears


you can talk to me
you-can-talk-to-me
you can talk to me

if you're lonely
you can talk to me"

Reply via email to