On Sun, Oct 20, 2013 at 02:49:59AM +0200, Christoph Anton Mitterer wrote: > [...] > Anyway... who should put they key in such a place? If you're already > that far, that some evil application is running with enough rights on > your system to do that,... you're screwed anyway, and nothing can help > you with that. Indeed. And this app needs root-permissions as it is writing data to raw partitions. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@xxxxxxxxxxx GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718 ---- There are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult. --Tony Hoare _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt