* Bill Oliver:
> Is there anything like that for fedora?
There is some work on TPM support for LUKS. I don't know if it has
made its way into Fedora, though.
> It would probably be pretty easy to hack the gpg source code to add
> a few lines to append system information to the passphrase, but i
On 11/27/2014 12:01 PM, Bill Oliver wrote:
On Thu, 27 Nov 2014, Robert Moskowitz wrote:
On 11/27/2014 11:34 AM, Bill Oliver wrote:
On Wed, 26 Nov 2014, Bruno Wolff III wrote:
> On Wed, Nov 26, 2014 at 20:47:25 +,
> Bill Oliver wrote:
> > On Wed, 26 Nov 2014, Bill Oliver wrote:
> >
On Thu, 27 Nov 2014, Robert Moskowitz wrote:
On 11/27/2014 11:34 AM, Bill Oliver wrote:
On Wed, 26 Nov 2014, Bruno Wolff III wrote:
> On Wed, Nov 26, 2014 at 20:47:25 +,
> Bill Oliver wrote:
> > On Wed, 26 Nov 2014, Bill Oliver wrote:
> >
> > Actually, let me be more specific. Le
On 11/27/2014 11:34 AM, Bill Oliver wrote:
On Wed, 26 Nov 2014, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specific. Let's say I have data on a flash
drive that is encrypted using gpg.
On Wed, 26 Nov 2014, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specific. Let's say I have data on a flash
drive that is encrypted using gpg. We can even say the flash drive
itself is en
In addition to any other solution you end up using, consider
self-encrypting drives (SED); for instance:
http://www.computerweekly.com/feature/Self-encrypting-drives-SED-the-best-kept-secret-in-hard-drive-encryption-security
G'luck,
--
Dave Ihnat
dih...@dminet.com
--
users mai
On 11/26/2014 10:18 PM, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 20:33:51 -0500,
Robert Moskowitz wrote:
On 11/26/2014 07:10 PM, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specif
On Wed, Nov 26, 2014 at 20:33:51 -0500,
Robert Moskowitz wrote:
On 11/26/2014 07:10 PM, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specific. Let's say I have data on a flash
drive that
On 11/26/2014 07:10 PM, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specific. Let's say I have data on a flash
drive that is encrypted using gpg. We can even say the flash drive
itself is
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specific. Let's say I have data on a flash
drive that is encrypted using gpg. We can even say the flash drive
itself is encrypted.
Now let's say that flash drive is st
On 11/26/2014 05:06 PM, Joe Zeff wrote:
On 11/26/2014 01:58 PM, Bill Oliver wrote:
Then I'd rely on decrypted backups, which are stored under physical lock
and key. Or, if necessary, I'd simply go back to the client and get the
data again. I do that a lot with paper files, since I burn them wh
On 11/26/2014 04:58 PM, Bill Oliver wrote:
On Wed, 26 Nov 2014, Joe Zeff wrote:
On 11/26/2014 12:47 PM, Bill Oliver wrote:
Now let's say that flash drive is stolen, lost, etc. *and* the
passphrase is compromised. I want the data on the flash drive to be
available *only on one computer* ev
On 11/26/2014 01:58 PM, Bill Oliver wrote:
Then I'd rely on decrypted backups, which are stored under physical lock
and key. Or, if necessary, I'd simply go back to the client and get the
data again. I do that a lot with paper files, since I burn them when my
consultation is finished. Occasiona
On Wed, 26 Nov 2014, Joe Zeff wrote:
On 11/26/2014 12:47 PM, Bill Oliver wrote:
Now let's say that flash drive is stolen, lost, etc. *and* the
passphrase is compromised. I want the data on the flash drive to be
available *only on one computer* even if the passphrase is known.
What happens
On 11/26/2014 12:47 PM, Bill Oliver wrote:
Now let's say that flash drive is stolen, lost, etc. *and* the
passphrase is compromised. I want the data on the flash drive to be
available *only on one computer* even if the passphrase is known.
What happens when (not if) some piece of hardware dies
On 11/26/2014 12:43 PM, Bill Oliver wrote:
How do you mean "incorporate?" So you simply mean store a long
passphrase on the flash drive?
No, you store part of the passphrase on the flash drive and the other
part in your brain.
--
users mailing list
users@lists.fedoraproject.org
To unsubscrib
On Wed, 26 Nov 2014, Bill Oliver wrote:
On Wed, 26 Nov 2014, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 17:39:34 +,
Bill Oliver wrote:
>
> For the HP issue, the fix is easy -- you just delete the command to
> check during boot up. But, I was thinking about this as an encryptio
How do you mean "incorporate?" So you simply mean store a long passphrase on
the flash drive?
billo
On Wed, 26 Nov 2014, jd1008 wrote:
That is quite easy.
Get a small thumb drive which are now almost free.
Put on it some random data (be sure that data is not
also on your HD).
So, when you
On Wed, 26 Nov 2014, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 17:39:34 +,
Bill Oliver wrote:
For the HP issue, the fix is easy -- you just delete the command to check
during boot up. But, I was thinking about this as an encryption option --
where one could encrypt files in a way
On Wed, Nov 26, 2014 at 17:39:34 +,
Bill Oliver wrote:
For the HP issue, the fix is easy -- you just delete the command to check
during boot up. But, I was thinking about this as an encryption option --
where one could encrypt files in a way that automatically incorporates hardware
inf
That is quite easy.
Get a small thumb drive which are now almost free.
Put on it some random data (be sure that data is not
also on your HD).
So, when you encrypt, you incorporate that data into
the encrypted file(s), then remove the thumb drive.
On 11/26/2014 10:39 AM, Bill Oliver wrote:
I w
I was thinking about the infamous "code purple error" for HP computers, where Windows is
keyed to the hardware of the machine. If you swap out a hard drive or change a card, it won't
boot. Apparently, there is a "tattoo" of various hardware identifiers in static memory
somewhere and the OS m
22 matches
Mail list logo