If you really have sensitive information, then don't keep the keys in RAM.

Shutdown/hibernate the machine, and require multi-factor auth to boot the 
machine.

Cheers
Ken

-----Original Message-----
From: Mike Gill [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 26 February 2008 9:29 AM
To: NT System Admin Issues
Subject: RE: FYI: Security boffins unveil BitUnlocker

Well, it all depends on why the laptop was stolen. I'm sure most thefts like
this are about turning a quick buck, but if the theft is about getting the
data, then this process sure does make it simple enough for the average Joe.

--
Mike Gill

> -----Original Message-----
> From: Angus Scott-Fleming [mailto:[EMAIL PROTECTED]
> Sent: Friday, February 22, 2008 9:54 PM
> To: NT System Admin Issues
> Subject: Re: FYI: Security boffins unveil BitUnlocker
>
> I ain't too worried.  My truecrypt volumes are not likely to be NSA
> targets and
> I doubt seriously that laptop thieves are likely to try this for the
> foreseeable future...
>
> YMMV, of course ....


~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

Reply via email to