If you really have sensitive information, then don't keep the keys in RAM. Shutdown/hibernate the machine, and require multi-factor auth to boot the machine.
Cheers Ken -----Original Message----- From: Mike Gill [mailto:[EMAIL PROTECTED] Sent: Tuesday, 26 February 2008 9:29 AM To: NT System Admin Issues Subject: RE: FYI: Security boffins unveil BitUnlocker Well, it all depends on why the laptop was stolen. I'm sure most thefts like this are about turning a quick buck, but if the theft is about getting the data, then this process sure does make it simple enough for the average Joe. -- Mike Gill > -----Original Message----- > From: Angus Scott-Fleming [mailto:[EMAIL PROTECTED] > Sent: Friday, February 22, 2008 9:54 PM > To: NT System Admin Issues > Subject: Re: FYI: Security boffins unveil BitUnlocker > > I ain't too worried. My truecrypt volumes are not likely to be NSA > targets and > I doubt seriously that laptop thieves are likely to try this for the > foreseeable future... > > YMMV, of course .... ~ Upgrade to Next Generation Antispam/Antivirus with Ninja! ~ ~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm> ~ ~ Upgrade to Next Generation Antispam/Antivirus with Ninja! ~ ~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm> ~
