@lembas: I disagree !

A hidden encrypted container will not help in any scenario. Those with a serious interest in your data would torture you so long until you tell them that there is a hidden container. Those who steal your notebook or want to copy your data will make a full clone of your drive anyhow and most likely will be able to find out about hidden partitions since nothing can really be "hidden" if you need to retrive / open the container to work with it.

Persons who travel to the US for example should not port a notebook with date anyhow. They are best of with a clean HDD without any data / OS on it (dd if=/dev/zero of=/dev/your-drive). After they arrive they should access their data stored on an external server via secure connection and download their stuff. A live GNU/Linux distribution plus access to your data via sshfs or sftpfs will most likely work pretty transparent since your can use FUSE to access your remote data like a local drive.

IMO the same goes for people which sensitive data. No sensitive data should be stored on your local drives in case of a house search. Today it is pretty easy to store data at some server you can trust (e.g. running owncloud on a remote server outside your country / running an sftp server which keeps your tomb file).


Reply via email to