Gentoo Archives: gentoo-user

From: Rich Freeman <rich0@g.o>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
Date: Mon, 02 Jun 2014 11:28:59
Message-Id: CAGfcS_mZUycViVxkQA41kWm8KQxp7UcRwn3AYPsifyNL8SFEeQ@mail.gmail.com
In Reply to: Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet? by Neil Bothwick
1 On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@××××××××××.uk> wrote:
2 > On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
3 >
4 >> The second option does sound what I am looking for. Basically, if I log
5 >> out but leave my computer on, leave home, some crook/NSA type breaks in
6 >> and tries to access something or steals my whole puter, they would just
7 >> get garbage for data. That seems to fit the second option best.
8 >
9 > If they steal your computer they will have to power it off, unless you
10 > are kind enough to leave them a large enough UPS to steal along with it,
11 > so any encryption will be equally effective.
12
13 If you're worried about casual thieves then just about any kind of
14 properly-implemented encryption will stop them.
15
16 If you're worried about a government official specifically tasked with
17 retrieving your computer, my understanding is that it is SOP these
18 days to retrieve your computer without powering it off for just this
19 reason. They won't use your UPS to do it. Typically they remove the
20 plug just far enough to expose the prongs, slide in a connector that
21 connects it to a UPS, and then they pull it out the rest of the way
22 now powered by the UPS.
23
24 See something like:
25 http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
26
27 Presumably somebody who is determined will also have the means to
28 retrieve the contents of RAM once they seize your computer. Besides
29 directlly accessing the memory bus I think most motherboards are not
30 designed to be secure against attacks from PCI/firewire/etc.
31
32 Rich

Replies