BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Server/laptop full-disk encryption
- Subject: [Discuss] Server/laptop full-disk encryption
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- Date: Wed, 1 Oct 2014 10:52:21 +0000
- In-reply-to: <542B5DBC.2090805@horne.net>
- References: <fb73f4b8a491577a02de5fcaf7779293.squirrel@webmail.ci.net> <de529929c36240babe4229ad818da975@CO2PR04MB684.namprd04.prod.outlook.com> <542B5DBC.2090805@horne.net>
> From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss- > bounces+blu=nedharvey.com at blu.org] On Behalf Of Bill Horne > > On 9/30/2014 9:38 AM, Edward Ned Harvey (blu) wrote: > > In linux, I'm not aware of any product that does whole disk encryption > without needing a power-on password. In windows, Bitlocker uses the TPM > to ensure the OS gets booted untampered, and then your user logon > password and OS security are used to prevent unauthorized access. This is > truly great to protect against thugs and laptop thieves. > > > > No offense, but why would it/ how could it? A laptop thief isn't likely > to be looking for /your/ info, I didn't mean it deters thieves. I meant it protects your data against thieves. There are many situations where the data value greatly exceeds the laptop value - but even when it doesn't - Even if your data is only worth $1, then it's good to limit your loss to the value of the hardware and nothing more.
- Follow-Ups:
- [Discuss] Server/laptop full-disk encryption
- From: bogstad at pobox.com (Bill Bogstad)
- [Discuss] Server/laptop full-disk encryption
- Prev by Date: [Discuss] Server/laptop full-disk encryption
- Next by Date: [Discuss] Server/laptop full-disk encryption
- Previous by thread: [Discuss] Server/laptop full-disk encryption
- Next by thread: [Discuss] Server/laptop full-disk encryption
- Index(es):