That's a good point.
E
On Wed, 26 Sep 2001, tack wrote:
> You're assuming that the drive is going to be booted off of, instead of
> copied and analized. If I just have a binary image of a drive, I can grep
> for n entropy of l bits (l being a hash of say 40, 128...4096) in length,
> yielding all potential keypairs on the volume. This requires no login.
> They can even just slave the drive in another machine specifically
> designed to do this.
>
> might only take a half hour or less.
>
> tack
>
> On Wed, 26 Sep 2001, Erik Curiel wrote:
>
> >
> > My private key is password protected. In order for it to be used to
> > decode my encrypted crap, someone would first have to crack the password.
> > This, I grant you, is not so difficult as decoding encrytped messages
> > themselves, but it's still no piece of cake.
> >
> > E
> >
> >
> > On 26 Sep 2001, John Hunter wrote:
> >
> > > >>>>> "Erik" == Erik Curiel <[EMAIL PROTECTED]> writes:
> > >
> > > Erik> All your data will still be sitting in plaintext on your
> > > Erik> computer when all's said and done, waiting for any FBI/ATF
> > > Erik> sucker to swoop in and snag it.
> > >
> > > Yeah but so what, so is your private key, right? Or are you hard core
> > > enough to keep it separate?
> > >
> > > JDH
> > >
> > >
> > >
> >
> >
>
>
--
Erik Curiel
Sometime Web Engineer/Almost Philosopher
"sheepdog standing in the rain
bullfrog doing it again
some kind of happiness
is measured out in miles
what makes you think you're something special
when you smile
childlike no one understands
jack knife in your sweaty hands
some kind of innocence
is measured out in years
you don't know what it's like
to listen to your fears
you can talk to me
you-can-talk-to-me
you can talk to me
if you're lonely
you can talk to me"