On Sat, 8 Feb 2003, Sunder wrote:
> In real life this will not work as most Windoze hard disk encryption
> schemes can't encrypt the OS disk - and this is where the temp/cache stuff
> goes.
> These can have more than enough info to reveal what's on your crypto disk
> (ie. shortcuts to url's you've recently visited, recently opened
> documents, etc...)
>
> At least with a unixish OS you can mount your crypto file systems up at
> boot time before the OS really starts up (before the system goes to
> multi-user mode for example (at the end of /etc/rc1.d and before the
> rc2.d init starts.)
Which is a blind path since those files -must- be unencrypted and if they
do mount the disk they have to have access to the key to unencrypt the fs
hence you're in the same boat as with Winblows.
--
____________________________________________________________________
We are all interested in the future for that is where you and I
are going to spend the rest of our lives.
Criswell, "Plan 9 from Outer Space"
[EMAIL PROTECTED] [EMAIL PROTECTED]
www.ssz.com www.open-forge.org
--------------------------------------------------------------------