On Wed, Apr 03, 2013 at 11:51:11AM -0700, Katy P wrote:
What is easier for a lay person and least susceptible to a smart thief?
You didn't mention your operating system, but in terms of least
pain I would go with http://www.truecrypt.org/downloads and
encrypt the whole drive. Make sure your
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
(Apologies if I am making an assumption on people's knowledge)
Entropy in disk encryption is the random information collected by an
computers OS or encryption application for use in encrypting a hard disk.
Those with more knowledge in encryption:
Hello LibTech community,
I wanted to let you all know that the Internet freedom team at State/DRL has
posted our annual open call for statements of interest (SOI) on global Internet
freedom programming.
This year, we've changed things up a little bit. We are running two separate
proceedings:
From: civicaccess-discuss-boun...@civicaccess.ca
[mailto:civicaccess-discuss-boun...@civicaccess.ca] On Behalf Of Tracey P.
Lauriault
Sent: Thursday, April 04, 2013 11:02 AM
To: civicaccess discuss
Subject: [CivicAccess-discuss] Secrecy for Sale: How ICIJ's Project Team
Analyzed the Offshore Files
On Sun, Mar 31, 2013 at 11:47:31AM +0200, M. Fioretti wrote:
How could that happen? In the same, totally unsurprising ways in which
always happen to everybody who takes the same measures as you (no
offense meant, really, just a technical explanation!). It happened in
one of these two ways
I think remote wipe software is a scam. There is no way to know that
the system will ever be remotely accessible[1]; there is no way to know that
it will be booted into the operating system that was installed; there is
no way to know that the storage media will even be in the same system
when
Great work! Although the pataphysical corollary of modern physics'
observer effect should apply!
Made it to The Guardian today:
Leaks reveal secrets of the rich who hide cash offshore
http://gu.com/p/3eqg8
On Apr 4, 2013 1:25 PM, michael gurstein gurst...@gmail.com wrote:
*From:*