.html
--
Saqib Ali, CISSP, ISSAP
http://www.full-disk-encryption.net
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
I compile a lot of software on my laptop, and I *certainly notice* the
difference between my office laptop (no encryption) and my travel
laptop (with FDE). The laptops are exactly the same, with the same
image loaded. The only difference is the FDE software that is
installed on the travel laptop.
Hello Alexander,
My guess is that slow compilation is a result of access time
misconfiguration: if a filesystem has access time enabled, then each
time a file is read, the file system updates access time on disk. A
solution is to set noatime option on the filesystem used for
compilation.
This
http://csrc.nist.gov/publications/nistpubs/800-100/sp800-100.pdf
This guide is specifically written for top level security/info
management (CSOs, CIOs etc). It addresses the requirements of various
security policies and laws, such as Clinger-Cohen Act (CCA) and FISMA.
--
Saqib Ali, CISSP, ISSAP
not really. however Privacy Rights Clearinghouse reports that
100,000,000 personal records have ended up in criminal hands since
2005. See:
http://www.privacyrights.org/ar/chrondatabreaches.htm
That does not mean 100 million people have become victims of identity
theft. And there is no reason to
Hello All,
I would like to know how much weight people usually give to the FIPS
140-2 Level 1 certification.
If two products have exactly same feature set, but one is FIPS 140-2
Level 1 certified but cost twice. Would you go for it, considering the
Level 1 is the lowest.
saqib
Assuming that the two products use Internet protocols (as compared to
proprietary protocols):
I don't understand this statement. What do you mean by internet
protocol vs proprietary protocol???
And also we are looking at FDE solutions, so there are no internet
protocols involved in that.
no.
-- Forwarded message --
From: Bryan Glancey [EMAIL PROTECTED]
Date: Dec 27, 2006 7:47 AM
For everyone on this list's interest. The US Government is currently
conducting the largest single side-by-side comparison and competition
for the selection of a Full Disk Encryption product.
.
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
--
Saqib Ali, CISSP, ISSAP
http://www.full-disk-encryption.net
-
The Cryptography Mailing List
Unsubscribe by sending
An article on how to use freely available Full Disk Encryption (FDE)
products to protect the secrecy of the data on your laptops. FDE
solutions helps to prevent data leaks in case the laptop is stolen or
goes missing. The article includes a brief intro, benefits, drawbacks,
some tips, and a
the HDD once, and
new credentials are created.
--
Saqib Ali, CISSP, ISSAP
http://www.full-disk-encryption.net
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Legal access is a special case -- what is the law (and practice) in any
given country on forced access to keys? If memory serves, Mike Godwin
Yup. Disk Crypto has a ugly side as well, as highlighted by the recent
incident where FBI was unable to crack the encryption used by a
pedophile and
Yes, encrypted disks aren't much good unless the OS also encrypts
(at least) swap space. I note that OpenBSD ships with swap-space
I think you are confusing Disk Encryption with Full Disk Encryption
(FDE). They are two different beast.
FDE encrypts the entire boot drive, including the OS,
source doesn't necessarily mean that the
implementation is secure.
When is the last time you checked the code for the open source app
that you use, to make sure that it is written properly?
saqib
http://www.full-disk-encryption.net
On 1/18/07, Allen [EMAIL PROTECTED] wrote:
Saqib Ali wrote
And here is the wired coverage of the BitFrost platform:
http://www.wired.com/news/technology/0,72669-0.html?tw=wn_culture_1
From the article:
But it should come as no surprise -- given how thoroughly the project
has rewritten the conventions of what a laptop should be -- that the
OLPC's
i have been tasked by my advisor to create series of mini-lectures
slides on the topic of cryptography for a freshman year CS class. each
mini-lecture will be 10-12 mins and will be delivered towards the end
of the class (so i will have to make them *very* interesting). There
is be 12 sessions.
is remotely accurate.
http://www.sciam.com/article.cfm?chanID=sa001articleID=BD4EFAA8-E7F2-99DF-372B272D3E271363
--
Saqib Ali, CISSP, ISSAP
http://www.full-disk-encryption.net
-
The Cryptography Mailing List
Unsubscribe
This year's BT Young Scientist Award for Mathematics was awarded to a 19 year
old in the field of cryptography. The project, entitled 'An Extension of
Weiner's Attack on RSA Encryption' used complex mathematics to challenge the
security of keys associated with encryption. Using cutting edge
Source:
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/01/AR2007100100511.html
British law enforcement gained new powers on Monday to compel individuals and
businesses to decrypt data wanted by authorities for investigations.
..
Failure to comply could mean a prison sentence
http://www.freepatentauction.com/patent.php?nb=950
Snake Oil Keywords:
1) Breach-proof Encryption,
2) landmark invention in Cryptography and Information Security
saqib
http://security-basics.blogspot.com/
-
The Cryptography
20 matches
Mail list logo