From: | Greg Smith <gsmith(at)gregsmith(dot)com> |
---|---|
To: | PostgreSQL Advocacy List <pgsql-advocacy(at)postgresql(dot)org> |
Subject: | Re: 4 weeks to go |
Date: | 2008-04-25 06:42:19 |
Message-ID: | Pine.GSO.4.64.0804250230050.24277@westnet.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-advocacy |
On Thu, 24 Apr 2008, Marc G. Fournier wrote:
> Actually, after having a lengthy thread on this at work recently, the apparent
> issue is that they can demand that you enter the decrypt key to do the mount
> for them, *and*, if you fail to comply, refuse you entry (at a minimum) ...
TrueCrypt supports a "Hidden Volume" steganography feature where you can
have a decoy encrypted volume to give up if forced to enter an encryption
key, while the real files you want to secure (those you've put on
double-secret probation) are safe via a different password. This isn't a
cat and mouse game anymore--people who want to hide data have already won,
just not everyone knows the right techniques to use.
"A mystery wrapped in an Enigma is no more puzzling to Bruce Schneier than
a mystery wrapped in ROT-13." http://geekz.co.uk/schneierfacts/fact/22
--
* Greg Smith gsmith(at)gregsmith(dot)com http://www.gregsmith.com Baltimore, MD
From | Date | Subject | |
---|---|---|---|
Next Message | Chander Ganesan | 2008-04-25 12:43:09 | Re: Sun Talks about MySQL |
Previous Message | Marc G. Fournier | 2008-04-25 04:58:23 | Re: 4 weeks to go |