Chris Jones: blastzilla was just generalizing a bit.

Scenario A:
Every notebook has an encrypted partition that's created by default with a 
randomized key.

Only a few users set a key and use the encrypted partition.

When asked for a key everybody says "Huh?".

Those Certain People trying to access secrets aren't going to club
everyone senseless - they'd get pretty tired after the first 100.

UK law or not, it'll be like those stretches of the highway where
everyone breaks the speed limit, and the cops just don't care.

In comparison:

Scenario B:
Every notebook does not have an encrypted partition that's created by default.

Only a few users install an encrypted partition.

It would then be trivial for Certain People to give extra special
attention to those few users.

Worse, if those few users install crypto software that has a "hidden partition" 
feature (e.g. TrueCrypt) but do NOT actually use it. 
Q: "Why are you using this software if you're not using the hidden partition 
feature?"
A: "What hidden partition feature?"
Q: "You think we're stupid?"

As it is I think it's a bug to have disk crypto software on Ubuntu by
default but no encrypted partitions by default - it makes it a lot less
useful in real world scenarios.

When the Average Joes, Aunt Mays and Grandmas with Ubuntu also have
encrypted partitions, then the disk crypto will be useful.

-- 
General "rubberhose" vulnerability
https://bugs.launchpad.net/bugs/148440
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to