Chris Jones: blastzilla was just generalizing a bit. Scenario A: Every notebook has an encrypted partition that's created by default with a randomized key.
Only a few users set a key and use the encrypted partition. When asked for a key everybody says "Huh?". Those Certain People trying to access secrets aren't going to club everyone senseless - they'd get pretty tired after the first 100. UK law or not, it'll be like those stretches of the highway where everyone breaks the speed limit, and the cops just don't care. In comparison: Scenario B: Every notebook does not have an encrypted partition that's created by default. Only a few users install an encrypted partition. It would then be trivial for Certain People to give extra special attention to those few users. Worse, if those few users install crypto software that has a "hidden partition" feature (e.g. TrueCrypt) but do NOT actually use it. Q: "Why are you using this software if you're not using the hidden partition feature?" A: "What hidden partition feature?" Q: "You think we're stupid?" As it is I think it's a bug to have disk crypto software on Ubuntu by default but no encrypted partitions by default - it makes it a lot less useful in real world scenarios. When the Average Joes, Aunt Mays and Grandmas with Ubuntu also have encrypted partitions, then the disk crypto will be useful. -- General "rubberhose" vulnerability https://bugs.launchpad.net/bugs/148440 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs