at Monday, February 10, 2003 3:20 AM, Jim Choate
[EMAIL PROTECTED] was seen to say:
On Sun, 9 Feb 2003, Sunder wrote:
The OS doesn't boot until you type in your passphrase, plug in your
USB fob, etc. and allow it to read the key. Like, Duh! You know,
you really ought to stop smoking crack.
No shit Sherlock, that's the whole point! The OS doesn't boot until you
type in your passphrase, plug in your USB fob, etc. and allow it to read
the key. Like, Duh! You know, you really ought to stop smoking crack.
--Kaos-Keraunos-Kybernetos---
+ ^
at Monday, February 10, 2003 3:09 AM, Jim Choate
[EMAIL PROTECTED] was seen to say:
On Mon, 10 Feb 2003, Dave Howe wrote:
no, lilo is. if you you can mount a pgpdisk (say) without software,
then you are obviously much more talented than I am :)
Bullshit. lilo isn't doing -anything- at that
On Mon, 10 Feb 2003, Dave Howe wrote:
no, lilo is. if you you can mount a pgpdisk (say) without software, then you
are obviously much more talented than I am :)
Bullshit. lilo isn't doing -anything- at that point without somebody or
something (eg dongle) being present that has the -plaintext-
On Sun, 9 Feb 2003, Jim Choate wrote:
On Sun, 9 Feb 2003, Sunder wrote:
No shit Sherlock, that's the whole point!
Actually it's not, the point is to stop the attacker in their tracks.
Sigh, I don't know why I'm bothering to write anything your clueless
way... he we go. We're
Jim Choate wrote:
Yes, it can mount the partition. That isn't the problem. The problem
is that for lilo to do this it has to have access to the key in
plaintext. That makes the entire exercise moot.
not if you have to type it every time.
if you take that as criteria, then *all* encryption is
On Sat, 8 Feb 2003, Sunder wrote:
In real life this will not work as most Windoze hard disk encryption
schemes can't encrypt the OS disk - and this is where the temp/cache stuff
goes.
These can have more than enough info to reveal what's on your crypto disk
(ie. shortcuts to url's you've
Jim Choate wrote:
On Sat, 8 Feb 2003, Sunder wrote:
In real life this will not work as most Windoze hard disk encryption
schemes can't encrypt the OS disk - and this is where the temp/cache
stuff goes.
Not always - certainly, windows cache goes to a partition that must be
available at windows
On Sun, 9 Feb 2003, Dave Howe wrote:
Jim Choate wrote:
Yes, it can mount the partition. That isn't the problem. The problem
is that for lilo to do this it has to have access to the key in
plaintext. That makes the entire exercise moot.
not if you have to type it every time.
Then I'd say
Jim Choate wrote:
On Sun, 9 Feb 2003, Dave Howe wrote:
Jim Choate wrote:
Yes, it can mount the partition. That isn't the problem. The problem
is that for lilo to do this it has to have access to the key in
plaintext. That makes the entire exercise moot.
not if you have to type it every
In real life this will not work as most Windoze hard disk encryption
schemes can't encrypt the OS disk - and this is where the temp/cache stuff
goes.
You can change both where your browser caches stuff off the web and the
temp folder so that's ok, but this doesn't work well because temp has to
be
At 09:34 AM 02/06/2003 -0500, Tyler Durden wrote:
I've got a question...
If you actually care about the NSA or KGB doing a low-level
magnetic scan to recover data from your disk drives,
you need to be using an encrypted file system, period, no questions.
OK...so I don't know a LOT about how
If you actually care about the NSA or KGB doing a low-level
magnetic scan to recover data from your disk drives,
you need to be using an encrypted file system, period, no questions.
There are occasional articles that pop up on the net talking
about somebody's improved capability for data recovery.
at Thursday, February 06, 2003 2:34 PM, Tyler Durden
[EMAIL PROTECTED] was seen to say:
I've got a question...
If you actually care about the NSA or KGB doing a low-level
magnetic scan to recover data from your disk drives,
you need to be using an encrypted file system, period, no questions.
I've got a question...
If you actually care about the NSA or KGB doing a low-level
magnetic scan to recover data from your disk drives,
you need to be using an encrypted file system, period, no questions.
OK...so I don't know a LOT about how PCs work, so here's a dumb question.
Will this work
On Thu, 6 Feb 2003, Tyler Durden wrote:
Will this work for -everything- that could go on a drive? (In other words,
if I set up an encrypted disk, will web caches, cookies, and all of the
other 'trivial' junk be encrypted without really slowing down the PC?)
Depends on how well you build the
Thomas Shaddack [EMAIL PROTECTED] writes:
Second, where did the number 7 really come from?
From the OSI 7-layer model, which took it from the fact that the number 7 is
sacred to a certain tribe in Borneo (see The Elements of Networking Style,
by Mike Padlipsky).
Peter.
From the OSI 7-layer model, which took it from the fact that the number 7 is
It's simpler than that. Russians wanted 6, americans 8.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
-- Forwarded message --
Date: Tue, 04 Feb 2003 10:57:09 -0600
Subject: Putting the NSA Data Overwrite Standard Legend to Death...
From: Jonathan G. Lampe [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
OK, I'm sure this one will start a flame war, but...I work for a vendor
whose products
19 matches
Mail list logo