BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Back to the OP: Re: Server/laptop full-disk encryption
- Subject: [Discuss] Back to the OP: Re: Server/laptop full-disk encryption
- From: richard.pieri at gmail.com (Richard Pieri)
- Date: Wed, 01 Oct 2014 12:16:35 -0400
- In-reply-to: <c282f2d9d9c866f4092dcd88ba251956.squirrel@webmail.ci.net>
- References: <c282f2d9d9c866f4092dcd88ba251956.squirrel@webmail.ci.net>
On 10/1/2014 12:06 PM, Rich Braun wrote: > (a) the keys are convenient, readily accessible at every reboot > (b) the keys can't readily fall into the wrong hands These are contradictory requirements. The more readily accessible the keys are, the more readily they can be obtained by unwanted actors. -- Rich P.
- References:
- [Discuss] Back to the OP: Re: Server/laptop full-disk encryption
- From: richb at pioneer.ci.net (Rich Braun)
- [Discuss] Back to the OP: Re: Server/laptop full-disk encryption
- Prev by Date: [Discuss] CipherShed: TrueCrypt fork
- Next by Date: [Discuss] Shellshock
- Previous by thread: [Discuss] Back to the OP: Re: Server/laptop full-disk encryption
- Next by thread: [Discuss] Back to the OP: Re: Server/laptop full-disk encryption
- Index(es):