Re: Hidden volumes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, May 19, 2008 at 03:15:19PM +0200, Ma Begaj wrote:
> 2008/5/18 Arno Wagner <arno@xxxxxxxxxxx>:
> > I should add that hiding does not work very well if the other side
> > has the power to make you give them the key, e.g. at a US border
> > crossing.
> 
> just to be clear ... they have the right to get all your personal data
> from your laptop without any paper, like court order? damn ...

Looks that way. And if you refuse to give the keys, they
can send you back and never need to justify it. Current
advice for people handling confidential data is to cross 
the border with a clean Laptop and to get the data afterwards
over the Internet. Wipe it securely before crossing the border 
again or destroy and leave the HDD behind.

Damn, traveling to the US is getting to be more and more of a 
pain. No surprise their tourism revenue is way down.

Arno
-- 
Arno Wagner,   Dipl. Inform.,  CISSP    ---    Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux