Could prove an interesting cat-and-mouse game. For instance, what if I
stored by encrypted container file as a binary object within a database.
Would it be detectable then?
Seth
On Thu, 24 Apr 2008, Marc G. Fournier wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
>
> - --On Thursday, April 24, 2008 18:55:38 -0700 Seth Grimes
> <grimes@altaplana.com>
> wrote:
>
>> That article is about network traffic.
>>
>> Sensitive material on one's laptop hard drive is a different concern. If
>> it's a concern of yours, check out some open source software called
>> TrueCrypt, http://www.truecrypt.org/ , which allows you to create and
>> encrypted container file, which may be hidden. Once that file is mounted,
>> which requires a password, it looks like just another drive.
>
> Actually, after having a lengthy thread on this at work recently, the apparent
> issue is that they can demand that you enter the decrypt key to do the mount
> for them, *and*, if you fail to comply, refuse you entry (at a minimum) ...
>
> Of course, they have to know the drive is actually there for this, but
> considering how many public lists that this thread has been discussed on, it
> won't take long for them to train those guys to find it for themselves ;)
>
>
> - --
> Marc G. Fournier Hub.Org Hosting Solutions S.A. (http://www.hub.org)
> Email . scrappy@hub.org MSN . scrappy@hub.org
> Yahoo . yscrappy Skype: hub.org ICQ . 7615664
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.8 (FreeBSD)
>
> iEYEARECAAYFAkgRRNsACgkQ4QvfyHIvDvO8MQCggZ3m+rniyhyBvXy5Qdawvghf
> pwMAoN0GWZXHgLXINhUNPM3v5chQe10v
> =Bko8
> -----END PGP SIGNATURE-----
>
--
Seth Grimes Alta Plana Corp, analytical computing & data management
Intelligent Enterprise magazine (CMP), Contributing Editor
grimes@altaplana.com http://altaplana.com 301-270-0795