Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
The few times I've had to take my Linux laptop through the airport all I had todo was show it booting up. I guess when it comes to encrypted file systems, I would recommend that you don't encrypt the whole thing, just store the important stuff on some separate file system that doesn't automatically get mounted on boot. Store the key on a USB floppy, have a secure password and use some form of biometrics, etc. That way, if customs decides they want to be asses, they'll really have to work for the pictures of your children and your tax returns! -----Original Message----- From: discuss-bounces at blu.org [mailto:discuss-bounces at blu.org] On Behalf Of clark_k at pannaway.com Sent: Monday, April 25, 2005 11:10 AM To: discuss at blu.org Subject: Re: Encrypted filesystems Kent Borg writes: > And what happens the day you are pulled aside at customs or airport > security and are ordered to type in your passphrase? What do you do? > Do you care if they see your data? (How much do you care?) Is there any legal reason (in the US) why you'd ever have to do this? If so, what if you responded "I forgot my passphrase."? Thanks, --kevin -- GnuPG ID: B280F24E And the madness of the crowd alumni.unh.edu!kdc Is an epileptic fit -- Tom Waits _______________________________________________ Discuss mailing list Discuss at blu.org http://olduvai.blu.org/mailman/listinfo/discuss
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |