Re: using a salt for encrypting blocks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Dec 30, 2010 at 11:11:18AM +0100, octane indice wrote:
> En r?ponse ? Milan Broz <mbroz@xxxxxxxxxx> :
> > Good luck. Do you know how easy is to use hw keylogger for
> > example?
> 
> yes.
> 
> > How do you detect that attacker installed such hw device when
> > he has repeated access to the system?
> > TPM will not help here.
> 
> no. TPM won't help against an hw keylogger.
> But it will help in order to detect a change in my /boot 
> partition. And for that, it works. It's so easy to break the
> encryption by modifying /boot than something has to be 
> done. Here, TPM can help, so I use.
> 
> For hardware keylogger, I would use a laptop
> very tiny where every change would be noticed.
> For example, a mac book air. So thin, you can't add
> a hardware keylogger. 

Good luck with that. Or rather forget about that. 
There is ample space.

Arno
-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux