Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU |
If someone gets hold of a disk and it's AES encrypted, they won't be able to break it any time soon. Why would refusing to not open the encrypted file be any different then refusing to vpn in? ~Ben On Tue, Apr 15, 2008 at 4:07 PM, Kent Borg <[hidden email]> wrote: > Gregory Boyce wrote: > > > Are you worried about them breaking the 128 bit AES encryption on your > > disk? Or are you worried they're going to try to force you to decrypt it? > > > > I am worried about forcing the traveler to decrypt. > > If they're trying to force you to decrypt it, they're not just going to > > let it slide when your decryption attempt fails to work. > > > > So currently they tell the traveler to decrypt the file. They traveler > types the key. They tell the traveler to log in to the corporate VPN. The > traveler refuses. That is apparently happening. It seems the customs people > know the difference. > > If people start traveling with damaged files they might know that > difference too. If I can show a 0x00 every 16th byte, they might notice, but > I would rather something that is known. > > And, this is my excuse for not just writing my own utility. I want to use > a known utility. > > Oh, and I am not really worried about myself. I want lots of people to > travel with such security. That makes me more secure, too. > > -kb > > > -- > This message has been scanned for viruses and > dangerous content by MailScanner, and is > believed to be clean. > > _______________________________________________ > Discuss mailing list > [hidden email] > http://lists.blu.org/mailman/listinfo/discuss >
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |