On 30/04/2011, Kevin Chadwick <[email protected]> wrote:
> On Sat, 30 Apr 2011 17:11:21 +0200
> Thomas de Grivel wrote:
>
>> 2011/4/29 Kraktus <[email protected]>
>>
>> > On 28/04/2011, Kevin Chadwick <[email protected]> wrote:
>> > > On Wed, 27 Apr 2011 18:56:57 -0400
>> > > Kraktus wrote:
>> > >
>> > >> So, I think OpenBSD tops the list of operating systems that "just
>> > >> work". The only thing I really wish for is more encryption options
>> > >> for
>> > >> softraid.
>
>>
>> I don't understand what makes you feel more secure giving access to your
>> private data to an untrusted OS ? Once you hand the key it's just like an
>> unencrypted block device, right ? Or do you have some magic userland
>> preventing kernel from seeing your decrypted data because your heap is
>> encrypted too ?  lol
>>
>
> I figured similar but after a couple of looks back I guessed! he meant a
> restricted ssh account to access the data in his home that isn't
> encrypted. That's perfectly doable now with vnconfig for blowfish or
> bioctl for aes??

No, I just meant there are a multitude of different threat models. Not
all attackers are remote. Some of them are local. You know, the thief
who breaks into your house, grabs the computer, and proceeds to mount
the filesystems on your hard disks from his own hard disk running his
own operating system, where he is root or administrator or whatever.
At this point, OpenBSD is moot, since your OpenBSD isn't running, his
operating system is running. Or the jealous wife of the guy who
invited himself over for dinner one time, without telling you he had a
wife, and said wife thinks that just because of that you must be
sleeping with her husband, and subsequently breaks into your house and
steals your computer to search for evidence. Or the guy who things
your husband cuckolded him with his wife, breaks in, steals the shared
computer, and tries to look at your husband's Windows partition.
(Reverse the genders if you are male.) Or the thief who jumps you
while you are carrying data to your friend's computer. Local
attackers. So you want to encrypt the data so that, while said data is
not in use, the local attacker just sees a bunch of gibberish. Except
sometimes data needs to be shared with people who use other operating
systems, unfortunately, and then you need cross-platform encryption.

>> Come on, encrypting disks comes only a long time after securing the system
>> itself, trusting your private data wont help you trust the OS.
>
> Your firefox profile may well be writeable under the above scenario
> which may? later help give away your key.

Well, sure, there's lots of attacks against different types of
encryption depending on the specifics of the situation. And only a
subset of people and organizations, e.g. the NSA, are in any position
to perform many of those attacks.

Reply via email to