On Mon, Aug 16, 2010 at 01:44:59PM +0200, Mario 'BitKoenig' Holbe wrote: > Arno Wagner <arno@xxxxxxxxxxx> wrote: > > Well, if the attacker mirrors your network traffic with iSCSI, > > encryption does not matter anymore for any change analysis. > > But using such a set-up wpuld be pretty stupid anayways.... ;-) > > Why? Do you have better ideas how to circumvent trusting your remote > Backup Provider than encrypting everything before sending it away? > > Encrypted block-devices via iSCSI, AoE, or NBD are some of the more > comfortable solutions I'm thinking about when it comes to efficient > remote multi-generation backups (using rsnapshot on top, for example). I should have said "...pretty stupid anyways, if you are worried about a change analysis attack.". Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans If it's in the news, don't worry about it. The very definition of "news" is "something that hardly ever happens." -- Bruce Schneier _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt