Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month, online, via Jitsi Meet.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] Server/laptop full-disk encryption



On Wed, Oct 1, 2014 at 12:52 PM, Edward Ned Harvey (blu)
<blu at nedharvey.com> wrote:
>> From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss-
>> bounces+blu=nedharvey.com at blu.org] On Behalf Of Bill Horne
>>
>> On 9/30/2014 9:38 AM, Edward Ned Harvey (blu) wrote:
>> > In linux, I'm not aware of any product that does whole disk encryption
>> without needing a power-on password.  In windows, Bitlocker uses the TPM
>> to ensure the OS gets booted untampered, and then your user logon
>> password and OS security are used to prevent unauthorized access.  This is
>> truly great to protect against thugs and laptop thieves.
>> >
>>
>> No offense, but why would it/ how could it? A laptop thief isn't likely
>> to be looking for /your/ info,
>
> I didn't mean it deters thieves.  I meant it protects your data against thieves.  There are many situations where the data value greatly exceeds the laptop value - but even when it doesn't - Even if your data is only worth $1, then it's good to limit your loss to the value of the hardware and nothing more.

Unlike on-line data thieves who can automate their data collection to
attack thousands,
actually retrieving data from you stolen laptop will take significant
human effort on their part.
If there were bootable CDs out there that they could use to scan a
laptop for information to sell that might change things, but for now I
suspect that even a low bar would be sufficient to deter random
thieves from bothering to retrieve you data.

There is also the value of their time.   If your info is really only
worth a $1 to them vs ?? amount of time; are they going to bother?
Of course, even though it might only be worth $1 to them, it might be
worth much more to you to reduce the aggravation.  How much time it
will take you and whether you should be willing to spend that time (as
insurance) against future loss isn't obvious to me.   It seems like
whenever people start talking about computer security, there is a
tendency to shoot for the maximum theoretically possible.  We don't do
that when it comes to our cars or homes, but it does with computers.

Bill Bogstad



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org