Re: Efficacy of xts over 1TB

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 07/27/2010 01:42 AM, Mario 'BitKoenig' Holbe wrote:
> Of course, your attacker has to be able to capture a snapshot after the
> first fill-up ... probably via some forensic magic - people who believe
> in encryption often tend to also still believe in Peter Gutmann :)

No forensic magic is needed if you are eg. using a LUKS crypted iSCSI
volume and the attacker is able to mirror you network traffic.

Cheers, Uwe
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux