From: | "Marc G(dot) Fournier" <scrappy(at)hub(dot)org> |
---|---|
To: | Seth Grimes <grimes(at)altaplana(dot)com>, PostgreSQL Advocacy List <pgsql-advocacy(at)postgresql(dot)org> |
Subject: | Re: 4 weeks to go |
Date: | 2008-04-25 02:41:31 |
Message-ID: | 1C4992443C18B643BA112960@ganymede.hub.org |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-advocacy |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --On Thursday, April 24, 2008 18:55:38 -0700 Seth Grimes
<grimes(at)altaplana(dot)com>
wrote:
> That article is about network traffic.
>
> Sensitive material on one's laptop hard drive is a different concern. If
> it's a concern of yours, check out some open source software called
> TrueCrypt, http://www.truecrypt.org/ , which allows you to create and
> encrypted container file, which may be hidden. Once that file is mounted,
> which requires a password, it looks like just another drive.
Actually, after having a lengthy thread on this at work recently, the apparent
issue is that they can demand that you enter the decrypt key to do the mount
for them, *and*, if you fail to comply, refuse you entry (at a minimum) ...
Of course, they have to know the drive is actually there for this, but
considering how many public lists that this thread has been discussed on, it
won't take long for them to train those guys to find it for themselves ;)
- --
Marc G. Fournier Hub.Org Hosting Solutions S.A. (http://www.hub.org)
Email . scrappy(at)hub(dot)org MSN . scrappy(at)hub(dot)org
Yahoo . yscrappy Skype: hub.org ICQ . 7615664
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.8 (FreeBSD)
iEYEARECAAYFAkgRRNsACgkQ4QvfyHIvDvO8MQCggZ3m+rniyhyBvXy5Qdawvghf
pwMAoN0GWZXHgLXINhUNPM3v5chQe10v
=Bko8
-----END PGP SIGNATURE-----
From | Date | Subject | |
---|---|---|---|
Next Message | Seth Grimes | 2008-04-25 03:14:56 | Re: 4 weeks to go |
Previous Message | Seth Grimes | 2008-04-25 01:55:38 | Re: 4 weeks to go |