On Sun, 9 Feb 2003, Sunder wrote:

> No shit Sherlock, that's the whole point!

Actually it's not, the point is to stop the attacker in their tracks.

> The OS doesn't boot until you type in your passphrase, plug in your USB fob,
> etc. and allow it to read the key. Like, Duh!  You know, you really ought to
> stop smoking crack.

Spin doctor bullshit, you're not addressing the issue which is the
mounting of an encrypted partition -before- the OS loads (eg lilo, which
by the way doesn't really 'mount' a partition, encrypted or otherwise -
it just follows a vector to a boot image that gets dumped into ram and
the cpu gets a vector to execute it - one would hope it was the -intended-
OS or fs de-encryption algorithm). What does that do? Nothing (unless
you're the attacker).

There are two and only two general applications for such an approach. A
standard workstation which isn't used unless there is a warm body handy.
The other being a server which one doesn't want to -reboot- without human
intervention. Both imply that the physical site is -secure-, that is the
weakness to all the current software solutions along this line.


 --
    ____________________________________________________________________

      We are all interested in the future for that is where you and I
      are going to spend the rest of our lives.

                              Criswell, "Plan 9 from Outer Space"

      [EMAIL PROTECTED]                            [EMAIL PROTECTED]
      www.ssz.com                               www.open-forge.org
    --------------------------------------------------------------------

Reply via email to