Re: Remote authentication?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Sep 21, 2009 at 05:16:06PM +0200, Sven Eschenberg wrote:
> Rule of thumb:
> 
> If an adversary has physical access to the system, he can bypass any mean
> of protection, if you don't know he had access.
> In these cases, when there's a possibility, someone has physical access,
> you should always consider the system as compromised and you neither
> unlock anything, no matter if you do it remotely or locally.
> 
> Regards
> 
> -Sven
> 

Indeed. The best password/passphrase does not help if you are
talking to a compromised system. 

Arno
-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux