Kiggs, basing on the grahic descriptions, you must be working for some of the 
security agencies here!!
However, I was thinking that the moment the system has enough RAM 
available(assuming some process that was hoarding it has stopped) it also 
stops swapping and shifts base back to RAM. Aren't the objects that had been 
written to swap removed at this point? Swap is meant to be an emulation of 
RAM under dire circumstances, why should it hold on to the objects even when 
its services are no longer needed?

On Tuesday 27 December 2005 11:23, Kiggundu Mukasa wrote:
> If data is being written to swap...........
> And you are writing to osama bin laden daily (but have been smart
> enough to encrypt you hard disk partitions and all your emails) then
> when the CIA/FBI get your computer, they can search your swap and see
> what you have been saying to Osama.
>
> The guy is very paranoid, either into porn of some deviant variety or
> terrorist stuff, writing virulent viruses he intends to release into
> the wild, money laundering, working for a drug king-pin, helping
> finance the opposition etc.
>
> The point is that he expects the possibility of his computer being
> seized by the "authorities" for some behavior that the society in
> general (or the "authorities" in particular) does not approve of.
>
> When they do get his computer he wants to be sure that they cannot
> look at ANY of his data.
>
> The only flaw in the plan is ..... The "authorities" will fly you to
> a safe-house in northern poland, attach 250 Volts to your nuts and
> get you to enter the password yourself. You will actually volunteer
> to do so in any language they choose and you will apologise for
> making them buy you the plane ticket to poland, and offer to refund
> them the money.
>
> Kiggs
>
> On Dec 27, 2005, at 10:49 AM, Lule George William wrote:
> > Dear all,
> > Hope all of you are still alive after Christmas. Been researching
> > on something
> > but stumbled on a posting where some guy is asking for help on how
> > to encrypt
> > the swap partition, but he didn't say why he wants to encrypt it.
> > I have tried to look at it from different perspectives, but
> > considering the
> > circumstances that would force a machine to swap and when it does,
> > the time
> > data spends in swap, I still have failed to see why someone would
> > need to
> > encrypt swap. Can someone help me on this before I dismiss the
> > fellow as an
> > over zealous security freak?
> > --
> > **********************************************************************
> > **
> > Lule George William (Mr)
> > Network and Systems Administrator
> > Uganda Martyrs University, Nkozi
> > P.O. Box 5498 Kampala
> > Uganda
> > /* The only reason some people are alive is because it is illegal
> > to shoot
> > them */
> > _______________________________________________
> > LUG mailing list
> > [email protected]
> > http://kym.net/mailman/listinfo/lug
> > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
> >
> > The above comments and data are owned by whoever posted them
> > (including attachments if any). The List's Host is not responsible
> > for them in any way.
> > ---------------------------------------
>
> ****************                   *****************************
> Kiggundu Mukasa                # Computer Network Consultancy###
> KYM-NET LTD.                   # Intranets & Internet Solutions#
> Plot 80 Kanjokya Street
> P.O. Box 24284 Kampala, Uganda
> Tel:     +256 77 972255
>           +256 71 221141
> Fax:     +256 31 262122
> *****************************************************************

-- 
************************************************************************
Lule George William (Mr)
Network and Systems Administrator
Uganda Martyrs University, Nkozi
P.O. Box 5498 Kampala
Uganda
/* The only reason some people are alive is because it is illegal to shoot 
them */ 
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to