BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Server/laptop full-disk encryption
- Subject: [Discuss] Server/laptop full-disk encryption
- From: richb at pioneer.ci.net (Rich Braun)
- Date: Wed, 1 Oct 2014 16:01:30 -0700
- In-reply-to: <mailman.7753.1412199151.560.discuss@blu.org>
- References: <mailman.7753.1412199151.560.discuss@blu.org>
Bill wrote: > And we are back to what is your threat model and potentially > "rubber hose" key retrieval. > Or for that matter, if you have a "lot of money" do you have > paper copies of your financial statements and if so do you keep > them in a locked safe? And what about someone setting up a spy > camera in your home/favorite coffeee shop, so they can record you > typing your password/key before they steal your laptop. Where > does it all end? Stop. I'm not talking about the targeted gun-in-your-face robbery type of attack. I'm talking about the common thief who gets your hard drives and turns them (or a binary image copy) over (for a nominal price to pay for his next fix) to an organized extortion ring of the type that is proliferating overseas (which is scanning thousands of these data images to seek soft targets). Y'all have seen this in the news, I'm not just making things up as a paranoid delusion. All of us have sufficient data on our home servers to make us a target. Can we get to a technical discussion of key-server utilities, or is this where the conversation devolves into nothingness? -rich
- Follow-Ups:
- [Discuss] Server/laptop full-disk encryption
- From: eric.chadbourne at gmail.com (Eric Chadbourne)
- [Discuss] Server/laptop full-disk encryption
- Prev by Date: [Discuss] Shellshock
- Next by Date: [Discuss] CipherShed: TrueCrypt fork
- Previous by thread: [Discuss] Server/laptop full-disk encryption
- Next by thread: [Discuss] Server/laptop full-disk encryption
- Index(es):