Maybe common disk encryption is so compromised, there's no point to implementing?

Tracy Reed treed at ultraviolet.org
Sat May 3 22:48:32 PDT 2014


On Sat, May 03, 2014 at 09:39:02AM PDT, Tony Su spake thusly:
> It seems to me if true that this is exactly the type of compromise that
> hits at the purpose of full disk encryption, the protection of "data at
> rest" -- You don't want someone to be able to enable "data at rest" to be
> "not at rest."

This is NOT the purpose of full disk encryption. See my reply to Stewart.

-- 
Tracy Reed
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://www.kernel-panic.org/pipermail/kplug-list/attachments/20140503/0260c513/attachment.pgp


More information about the KPLUG-List mailing list