On 07/27/2010 01:42 AM, Mario 'BitKoenig' Holbe wrote: > Of course, your attacker has to be able to capture a snapshot after the > first fill-up ... probably via some forensic magic - people who believe > in encryption often tend to also still believe in Peter Gutmann :) No forensic magic is needed if you are eg. using a LUKS crypted iSCSI volume and the attacker is able to mirror you network traffic. Cheers, Uwe _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt