Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

'Big Sis' Reasserts Unlimited Power to Seize and Inspect Laptops
Townhall.com ^ | February 13, 2013 | Bob Barr

Posted on 02/14/2013 10:07:55 AM PST by Kaslin

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 last
To: ctdonath2

Everything on a computer can be read.Hackers can’t be stopped.


61 posted on 02/15/2013 9:09:11 AM PST by Vaduz
[ Post Reply | Private Reply | To 19 | View Replies]

To: Vaduz
You implied we don't have the right to privacy from our government. That's where we disagree. Tell me about that...I already know about credit reporting agencies - and what they can and can't collect. So leave the private sector out of this ...

Do you believe the United States government has the right to spy on private citizens. (without court orders)

62 posted on 02/15/2013 11:13:10 AM PST by GOPJ ( Illegal immigrants: violent boorish party crashers. Send them home, call police - make them leave.)
[ Post Reply | Private Reply | To 60 | View Replies]

To: GOPJ

You implied we don’t have the *right* to privacy from our government.
Not true I said there is no privacy.
Every transaction you do is recorded.Information on from birth to death is on file.
Ever wonder how much the IRS alone knows about you?.


63 posted on 02/16/2013 9:09:12 AM PST by Vaduz
[ Post Reply | Private Reply | To 62 | View Replies]

To: al baby
"...amble bosoms."

Are amble bosoms the kind that like to go out for a stroll by themselves? ;-)

64 posted on 02/16/2013 9:14:10 AM PST by Joe 6-pack (Qui me amat, amat et canem meum.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Joe 6-pack

Yes damits


65 posted on 02/16/2013 9:22:36 AM PST by al baby (Hi Mom)
[ Post Reply | Private Reply | To 64 | View Replies]

To: hiredhand

Do you know of any “partition encrypters” that they are not known to be able to get into?


66 posted on 03/05/2013 12:26:31 PM PST by DuncanWaring (The Lord uses the good ones; the bad ones use the Lord.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: DuncanWaring
Yes.... DM-Crypt for Linux. The default encryption algorithms (AES) are considered "strong", but it's not the algorithm alone which gives the system it's strength.

It's strength is in the way you set it up. The way I prefer is to encrypt the partition in question BUT keep the keys on a USB stick. But the USB stick itself has a DM-Crypt partition... inside of which is contained the clear-text keys for your hard disk's DM-Crypt partition.

In addition, you "could" create multiple partitions on the USB stick and keep trivial documents, and/or photos in them. Make sure that those partitions contain FAT or NTFS file systems so that a Windows system has no trouble reading them. "Most" people who examine such a USB stick never notice that one of the partitions is UNUSEABLE, nor do they pursue trying to discover what's in it.

I actually had it working such for awhile that the DM-Crypt partition was on my Android phone's SD card in a loop filesystem file. The phone wouldn't use it, but the Linux laptop DID when the phone was connected via USB! I ditched it though because I don't trust the Android that much. :-)

With the encryption keys kept separate from the laptop, accessing the laptop becomes nearly impossible without assistance from the owner. Also, concealing a micro-SD card with the "other" DM-Crypt partition on it, is a lot easier than hiding an entire laptop. :-)

Ubuntu Linux, Debian Linux, and MacOX come with partition level encryption capabilities. BUT... keeping your keys on separate media is still a subject which is off the beaten path. There's a LOT of info out there on how to do it with Linux. Just search Google (USE TOR!) using a string such as - "linux dm-crypt howto" and you'll get the answer. :-)

Since somebody is liable to ask... I'm going to tell you right now that keeping data on a fully encrypted partition brings with it other "issues". For starters, be sure to encrypt the swap space. A LOT of very useful information can be gleaned from unencrypted swap space. Encrypting swap space is easy though. :-) Also, backing it up is now an issue. I mean... HOW do you back up encrypted data, and keep the data secure if you simply back it up to other media? Well... you "could" DM-Crypt your media (external hard drive). I opted against this and instead use GNU Privacy Guard (GNUPG) and plain ole "tar". I stream the data to be backed up through gpg and tar, created a gpg encrypted tar archive as an end product. Oh... and the secret key for gnupg is on that USB stick INSIDE the DM-Crypt partition.

Anyway... pretty nerdy stuff... but that's just my preference. :-)
67 posted on 03/07/2013 10:20:55 AM PST by hiredhand
[ Post Reply | Private Reply | To 66 | View Replies]

To: hiredhand

Arg... forgive any typos in that posting. It posted before I meant to... got “button happy”. :-)


68 posted on 03/07/2013 10:22:36 AM PST by hiredhand
[ Post Reply | Private Reply | To 67 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson