On 29 Apr 2006 02:00:18 -, StealthMonger
[EMAIL PROTECTED] wrote:
Interesting epilog: theregister has apparently now edited out all
mention of master keys.
They probably had their misunderstanding pointed out to them by
countless people by now.
But... did anyone else note the phrasing of
Travis H. [EMAIL PROTECTED] writes:
Does anyone have any experience with disk or filesystem encryption,
especially with regard to unclean shutdowns and power failures? Normal
file systems are designed to fail in ways that are easy to
clean up with fsck, but when you start to throw encryption
I use the following approach to encrypting my disks.
I use an encrypted loopback device. The version of losetup I use
permits me to store the disk key in a PGP encrypted file and decrypt
it (with gpg) when needed. I made many backups of the both my personal
keyring and the file with the encrypted
| issues did start showing up in the mid-90s in the corporate world ...
| there were a large number of former gov. employees starting to show up
| in different corporate security-related positions (apparently after
| being turfed from the gov). their interests appeared to possibly reflect
[EMAIL PROTECTED] wrote:
A similar issue occurs in a civilian context, sometimes with fake
employees, other times with fake bills. Often, these get found
because they rely on the person committing the fraud being there
every time a check arrives: It's the check sitting around with no
one
On 5/1/06, Perry E. Metzger [EMAIL PROTECTED] wrote:
Not if you design it correctly. Disk encryption systems like CGD work
on the block level, and do not propagate CBC operations across blocks,
So is it vulnerable to any of the attacks here?
http://clemens.endorphin.org/LinuxHDEncSettings
I
Travis H. [EMAIL PROTECTED] writes:
On 5/1/06, Perry E. Metzger [EMAIL PROTECTED] wrote:
Not if you design it correctly. Disk encryption systems like CGD work
on the block level, and do not propagate CBC operations across blocks,
So is it vulnerable to any of the attacks here?
Ross Anderson once said cryptically,
HMAC has a long story attched to it - the triumph of the
theory community over common sense
He wouldn't expand on that any more... does anyone have an idea of
what he is referring to?
--
Curiousity killed the cat, but for a while I was a suspect -- Steven
In case you wondered what was behind those sequences of digits...
Gory details here:
http://www.licenturion.com/xp/fully-licensed-wpa.txt
Ew, I think I have to take a shower now.
--
Curiousity killed the cat, but for a while I was a suspect -- Steven Wright
Security Guru for Hire
Travis H. wrote:
Ross Anderson once said cryptically,
HMAC has a long story attched to it - the triumph of the
theory community over common sense
He wouldn't expand on that any more... does anyone have an idea of
what he is referring to?
I suggest that you read the theory, make your
10 matches
Mail list logo