Skip to comments.
'Big Sis' Reasserts Unlimited Power to Seize and Inspect Laptops
Townhall.com ^
| February 13, 2013
| Bob Barr
Posted on 02/14/2013 10:07:55 AM PST by Kaslin
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-68 last
To: ctdonath2
Everything on a computer can be read.Hackers can’t be stopped.
61
posted on
02/15/2013 9:09:11 AM PST
by
Vaduz
To: Vaduz
You implied we don't have the right to privacy from our government. That's where we disagree. Tell me about that...I already know about credit reporting agencies - and what they can and can't collect. So leave the private sector out of this ...
Do you believe the United States government has the right to spy on private citizens. (without court orders)
62
posted on
02/15/2013 11:13:10 AM PST
by
GOPJ
( Illegal immigrants: violent boorish party crashers. Send them home, call police - make them leave.)
To: GOPJ
You implied we don’t have the *right* to privacy from our government.
Not true I said there is no privacy.
Every transaction you do is recorded.Information on from birth to death is on file.
Ever wonder how much the IRS alone knows about you?.
63
posted on
02/16/2013 9:09:12 AM PST
by
Vaduz
To: al baby
"...amble bosoms." Are amble bosoms the kind that like to go out for a stroll by themselves? ;-)
64
posted on
02/16/2013 9:14:10 AM PST
by
Joe 6-pack
(Qui me amat, amat et canem meum.)
To: Joe 6-pack
65
posted on
02/16/2013 9:22:36 AM PST
by
al baby
(Hi Mom)
To: hiredhand
Do you know of any “partition encrypters” that they are not known to be able to get into?
66
posted on
03/05/2013 12:26:31 PM PST
by
DuncanWaring
(The Lord uses the good ones; the bad ones use the Lord.)
To: DuncanWaring
Yes.... DM-Crypt for Linux. The default encryption algorithms (AES) are considered "strong", but it's not the algorithm alone which gives the system it's strength.
It's strength is in the way you set it up. The way I prefer is to encrypt the partition in question BUT keep the keys on a USB stick. But the USB stick itself has a DM-Crypt partition... inside of which is contained the clear-text keys for your hard disk's DM-Crypt partition.
In addition, you "could" create multiple partitions on the USB stick and keep trivial documents, and/or photos in them. Make sure that those partitions contain FAT or NTFS file systems so that a Windows system has no trouble reading them. "Most" people who examine such a USB stick never notice that one of the partitions is UNUSEABLE, nor do they pursue trying to discover what's in it.
I actually had it working such for awhile that the DM-Crypt partition was on my Android phone's SD card in a loop filesystem file. The phone wouldn't use it, but the Linux laptop DID when the phone was connected via USB! I ditched it though because I don't trust the Android that much. :-)
With the encryption keys kept separate from the laptop, accessing the laptop becomes nearly impossible without assistance from the owner. Also, concealing a micro-SD card with the "other" DM-Crypt partition on it, is a lot easier than hiding an entire laptop. :-)
Ubuntu Linux, Debian Linux, and MacOX come with partition level encryption capabilities. BUT... keeping your keys on separate media is still a subject which is off the beaten path. There's a LOT of info out there on how to do it with Linux. Just search Google (USE TOR!) using a string such as - "linux dm-crypt howto" and you'll get the answer. :-)
Since somebody is liable to ask... I'm going to tell you right now that keeping data on a fully encrypted partition brings with it other "issues". For starters, be sure to encrypt the swap space. A LOT of very useful information can be gleaned from unencrypted swap space. Encrypting swap space is easy though. :-) Also, backing it up is now an issue. I mean... HOW do you back up encrypted data, and keep the data secure if you simply back it up to other media? Well... you "could" DM-Crypt your media (external hard drive). I opted against this and instead use GNU Privacy Guard (GNUPG) and plain ole "tar". I stream the data to be backed up through gpg and tar, created a gpg encrypted tar archive as an end product. Oh... and the secret key for gnupg is on that USB stick INSIDE the DM-Crypt partition.
Anyway... pretty nerdy stuff... but that's just my preference. :-)
To: hiredhand
Arg... forgive any typos in that posting. It posted before I meant to... got “button happy”. :-)
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-68 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson