> jerome etienne wrote: > > Nevertheless this assumption isnt mandatory, here is a scenario where it > > doesnt apply: > > 1. a user encrypt a whole removable disk with loop-aes > > 2. he goes in a conference and leave it unattended in a room (bad > > practice but it happen) > > 3. an attacker gets it, insert chosen data in it and put it back Question: What do you insert where? My usb-stick is in my pocket, my drive remains at home. You can break a door and enter. You can steal and erase my whole drive - no doubt - 100% data loss. But please tell me what do you want to insert, and where do you want it? In case you intend to leave me a message behind that you broke my door just write me an email. Regards, Peter -- GMX im TV ... Die Gedanken sind frei ... Schon gesehen? Jetzt Spot online ansehen: http://www.gmx.net/de/go/tv-spot - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/