Re: Distinguishability of encrypted partition

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 14 Jun 2006, Florian Reitmeir wrote:
"The" evils have much simpler ways to "crack" your security, a common
way (rumors) is, that

- "they" grab all your computer staff
- see its encrypted

s/see/assume/ ...as they can't be sure and probably won't hire a cryptoexpert to prove this, methinks.

- return the computer
- ... with an keylogger, small on the mainboard/keyboard/usb-bus/...
- then, come about 2 weeks/months later again

there we go again: triple-aes-1024 won't help if the cryptosystem is lame.

What I'm still courious about is: are "they" allowed to tamper with a "disk with random-looking data"? because, if she says: "No, it's just random data, dunno what crypto is" then "they" could say: "if it's only random, you won't object if we wipe your disk, right?".
But these are legal questions, i guess...

--
BOFH excuse #97:

Small animal kamikaze attack on power supplies

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux