You could run lsof on everything to find out what files are being opened and written to, but the easier way to be 100% sure that data (or information about your data) is not being written in plaintext somewhere is to:
1) Encrypt the whole filesystem and swap, or
2) Run a livecd without swap and write no unencrypted data to your hard drive.
In some ways (2) may be preferable since all you have then is an encrypted partition, which, as I understand it, is effectively impossible to distinguish from a randomly shredded partition.
Someone correct me if I'm wrong.
rodger ellis <rellis@xxxxxxx> wrote:
Hello
I don't see the point in encrypting / if you put all your personal data on the /home partition. Then / contains just the operating system, and that's nothing someone who steals your computer would be interested in.
Is my thinking correct here?
--
Der GMX SmartSurfer hilft bis zu 70% Ihrer Onlinekosten zu sparen!
Ideal f�r Modem und ISDN: http://www.gmx.net/de/go/smartsurfer
-
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com