On Wed, Oct 10, 2007 at 11:37:55PM +0200, Mel wrote: > > > > > > Encryption isn't only useful for private data, > > > it also reduces the risk of third parties replacing > > > your binaries with Trojans while your away. > > > > If that someone can replace binaries on a running system, you're box has > > been h4x0red and you're screwed anyway. Doubly so if your encrypted > > filesystem was mounted at the time. :-) > > I think the case he's describing, is that one can remove the harddisk, mount > it as secondary drive, replace system binaries with keylogging enabled > binaries and then put it back. You won't notice this till you read daily > security report in a default system.
That's a heck of a lot of trouble to go to, considering someone would have to steal your drive, alter it and put it back without you knowing it! If the intruder has physical access to the machine, it would be much easier to put a keylogger device between the keyboard and the machine. > It's questionable though, whether you should leave your computer in an > environment where this can happen undetected and probably better solved by > increasing real life security. An important point that too many people forget. Roland -- R.F.Smith http://www.xs4all.nl/~rsmith/ [plain text _non-HTML_ PGP/GnuPG encrypted/signed email much appreciated] pgp: 1A2B 477F 9970 BA3C 2914 B7CE 1277 EFB0 C321 A725 (KeyID: C321A725)
Description: PGP signature