Re: LUKS disk encryption with remote boot authentication

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/19/14 22:13, Cpp wrote:
> This circuitry will
> be reponsible for physical protection i.e. safe keeping the encryption
> key and destroy it in case an attacker tries to access it.
> Use some epoxy to prevent easy access to RAM
> chips... cold boot anyone?
Erm, just my two cents, but do you *really* think that this is a threat
to you?
In my opinion, costs and benefits should maintain balance...

And I am quite sure that your self-made tamper safe solution will
probably fail, if someone is really willing to break into your system.

So I think ssh'ing to your system and entering the passphrase manually
remains the best solution.

Cheers
  Ralf
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux