Thread: 4 weeks to go
In 4 short weeks, the center of the PostgreSQL universe will be once again located in Ottawa as PGCon 2008 gets underway. All the major preparations have been completed and very little remains to be done.. I'm finally able to take a breather and get in some mountain biking. :) But there's not a lot of time to rest. For me or for you. I still have to finalize the catering and arrange a few last minute travel arrangements. If you haven't booked your trip yet, I urge you to do so immediately. Don't hesitate, do it today. -- Dan Langille -- http://www.langille.org/ dan@langille.org
On Apr 21, 2008, at 10:03 PM, Dan Langille wrote: > In 4 short weeks, the center of the PostgreSQL universe will be > once again > located in Ottawa as PGCon 2008 gets underway. All the major > preparations > have been completed and very little remains to be done.. I'm > finally able to > take a breather and get in some mountain biking. :) > > But there's not a lot of time to rest. For me or for you. I still > have to > finalize the catering and arrange a few last minute travel > arrangements. > If you haven't booked your trip yet, I urge you to do so immediately. > > Don't hesitate, do it today. For those in the US; don't bring your laptops! http://lnk.nu/news.com/ k4f.html -- Decibel!, aka Jim C. Nasby, Database Architect decibel@decibel.org Give your computer some brain candy! www.distributed.net Team #1828
Attachment
On Apr 23, 2008, at 3:19 PM, Decibel! wrote: > For those in the US; don't bring your laptops! http://lnk.nu/ > news.com/k4f.html Err, sorry, the correct link was http://lnk.nu/informationweek.com/ k4e.jhtml -- Decibel!, aka Jim C. Nasby, Database Architect decibel@decibel.org Give your computer some brain candy! www.distributed.net Team #1828
Attachment
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --On Wednesday, April 23, 2008 15:19:52 -0500 Decibel! <decibel@decibel.org> wrote: > On Apr 21, 2008, at 10:03 PM, Dan Langille wrote: >> In 4 short weeks, the center of the PostgreSQL universe will be >> once again >> located in Ottawa as PGCon 2008 gets underway. All the major >> preparations >> have been completed and very little remains to be done.. I'm >> finally able to >> take a breather and get in some mountain biking. :) >> >> But there's not a lot of time to rest. For me or for you. I still >> have to >> finalize the catering and arrange a few last minute travel >> arrangements. >> If you haven't booked your trip yet, I urge you to do so immediately. >> >> Don't hesitate, do it today. > > For those in the US; don't bring your laptops! http://lnk.nu/news.com/k4f.html Either that, or leave your child porn at home (in the case of the article above) ... But seriously, there are so many ways around this, easiest probably being to leave your sensitive stuff at home on a USB drive that you can re-load later ... or can mount remotely using something like samba ... Travel smart, not light ... - -- Marc G. Fournier Hub.Org Hosting Solutions S.A. (http://www.hub.org) Email . scrappy@hub.org MSN . scrappy@hub.org Yahoo . yscrappy Skype: hub.org ICQ . 7615664 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.8 (FreeBSD) iEYEARECAAYFAkgRNMwACgkQ4QvfyHIvDvPUbACeIlFpNn948URMR6rIS0xTMk1I OVoAn2AnT1tZI3lPN/1eYvE4L1TMT+uZ =vtp6 -----END PGP SIGNATURE-----
Marc G. Fournier wrote: > But seriously, there are so many ways around this, easiest probably being to > leave your sensitive stuff at home on a USB drive that you can re-load later > ... or can mount remotely using something like samba ... > > Travel smart, not light ... Let's not promote this thread. Sincerely, Joshua D. Drake
That article is about network traffic. Sensitive material on one's laptop hard drive is a different concern. If it's a concern of yours, check out some open source software called TrueCrypt, http://www.truecrypt.org/ , which allows you to create and encrypted container file, which may be hidden. Once that file is mounted, which requires a password, it looks like just another drive. Seth On Thu, 24 Apr 2008, Marc G. Fournier wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > > - --On Wednesday, April 23, 2008 15:19:52 -0500 Decibel! <decibel@decibel.org> > wrote: > >> On Apr 21, 2008, at 10:03 PM, Dan Langille wrote: >>> In 4 short weeks, the center of the PostgreSQL universe will be >>> once again >>> located in Ottawa as PGCon 2008 gets underway. All the major >>> preparations >>> have been completed and very little remains to be done.. I'm >>> finally able to >>> take a breather and get in some mountain biking. :) >>> >>> But there's not a lot of time to rest. For me or for you. I still >>> have to >>> finalize the catering and arrange a few last minute travel >>> arrangements. >>> If you haven't booked your trip yet, I urge you to do so immediately. >>> >>> Don't hesitate, do it today. >> >> For those in the US; don't bring your laptops! http://lnk.nu/news.com/k4f.html > > Either that, or leave your child porn at home (in the case of the article > above) ... > > But seriously, there are so many ways around this, easiest probably being to > leave your sensitive stuff at home on a USB drive that you can re-load later > ... or can mount remotely using something like samba ... > > Travel smart, not light ... > > - -- > Marc G. Fournier Hub.Org Hosting Solutions S.A. (http://www.hub.org) > Email . scrappy@hub.org MSN . scrappy@hub.org > Yahoo . yscrappy Skype: hub.org ICQ . 7615664 > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.8 (FreeBSD) > > iEYEARECAAYFAkgRNMwACgkQ4QvfyHIvDvPUbACeIlFpNn948URMR6rIS0xTMk1I > OVoAn2AnT1tZI3lPN/1eYvE4L1TMT+uZ > =vtp6 > -----END PGP SIGNATURE----- > > > -- Seth Grimes Alta Plana Corp, analytical computing & data management Intelligent Enterprise magazine (CMP), Contributing Editor grimes@altaplana.com http://altaplana.com 301-270-0795
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --On Thursday, April 24, 2008 18:55:38 -0700 Seth Grimes <grimes@altaplana.com> wrote: > That article is about network traffic. > > Sensitive material on one's laptop hard drive is a different concern. If > it's a concern of yours, check out some open source software called > TrueCrypt, http://www.truecrypt.org/ , which allows you to create and > encrypted container file, which may be hidden. Once that file is mounted, > which requires a password, it looks like just another drive. Actually, after having a lengthy thread on this at work recently, the apparent issue is that they can demand that you enter the decrypt key to do the mount for them, *and*, if you fail to comply, refuse you entry (at a minimum) ... Of course, they have to know the drive is actually there for this, but considering how many public lists that this thread has been discussed on, it won't take long for them to train those guys to find it for themselves ;) - -- Marc G. Fournier Hub.Org Hosting Solutions S.A. (http://www.hub.org) Email . scrappy@hub.org MSN . scrappy@hub.org Yahoo . yscrappy Skype: hub.org ICQ . 7615664 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.8 (FreeBSD) iEYEARECAAYFAkgRRNsACgkQ4QvfyHIvDvO8MQCggZ3m+rniyhyBvXy5Qdawvghf pwMAoN0GWZXHgLXINhUNPM3v5chQe10v =Bko8 -----END PGP SIGNATURE-----
Could prove an interesting cat-and-mouse game. For instance, what if I stored by encrypted container file as a binary object within a database. Would it be detectable then? Seth On Thu, 24 Apr 2008, Marc G. Fournier wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > > - --On Thursday, April 24, 2008 18:55:38 -0700 Seth Grimes > <grimes@altaplana.com> > wrote: > >> That article is about network traffic. >> >> Sensitive material on one's laptop hard drive is a different concern. If >> it's a concern of yours, check out some open source software called >> TrueCrypt, http://www.truecrypt.org/ , which allows you to create and >> encrypted container file, which may be hidden. Once that file is mounted, >> which requires a password, it looks like just another drive. > > Actually, after having a lengthy thread on this at work recently, the apparent > issue is that they can demand that you enter the decrypt key to do the mount > for them, *and*, if you fail to comply, refuse you entry (at a minimum) ... > > Of course, they have to know the drive is actually there for this, but > considering how many public lists that this thread has been discussed on, it > won't take long for them to train those guys to find it for themselves ;) > > > - -- > Marc G. Fournier Hub.Org Hosting Solutions S.A. (http://www.hub.org) > Email . scrappy@hub.org MSN . scrappy@hub.org > Yahoo . yscrappy Skype: hub.org ICQ . 7615664 > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.8 (FreeBSD) > > iEYEARECAAYFAkgRRNsACgkQ4QvfyHIvDvO8MQCggZ3m+rniyhyBvXy5Qdawvghf > pwMAoN0GWZXHgLXINhUNPM3v5chQe10v > =Bko8 > -----END PGP SIGNATURE----- > -- Seth Grimes Alta Plana Corp, analytical computing & data management Intelligent Enterprise magazine (CMP), Contributing Editor grimes@altaplana.com http://altaplana.com 301-270-0795
Seth Grimes wrote: > Could prove an interesting cat-and-mouse game. For instance, what if I > stored by encrypted container file as a binary object within a database. > Would it be detectable then? I think a better question would be, is it a cat and mouse game you want to play? Joshua D. Drake
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --On Thursday, April 24, 2008 20:28:32 -0700 "Joshua D. Drake" <jd@commandprompt.com> wrote: > Seth Grimes wrote: >> Could prove an interesting cat-and-mouse game. For instance, what if I >> stored by encrypted container file as a binary object within a database. >> Would it be detectable then? > > I think a better question would be, is it a cat and mouse game you want to > play? +1 I know that I don't like crossing the border much as it is, let alone giving Border Agents a reason to want to pull me to the side ... "yes sir, no sir, three bags full sir" with those guys :) - -- Marc G. Fournier Hub.Org Hosting Solutions S.A. (http://www.hub.org) Email . scrappy@hub.org MSN . scrappy@hub.org Yahoo . yscrappy Skype: hub.org ICQ . 7615664 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.8 (FreeBSD) iEYEARECAAYFAkgRZO8ACgkQ4QvfyHIvDvPsUQCfavqQUJpjG92RVTu03z40sKLy I20AmwSNqXtz5kx5Ets7HuqIUi4PaEh2 =oS3E -----END PGP SIGNATURE-----
On Thu, 24 Apr 2008, Marc G. Fournier wrote: > Actually, after having a lengthy thread on this at work recently, the apparent > issue is that they can demand that you enter the decrypt key to do the mount > for them, *and*, if you fail to comply, refuse you entry (at a minimum) ... TrueCrypt supports a "Hidden Volume" steganography feature where you can have a decoy encrypted volume to give up if forced to enter an encryption key, while the real files you want to secure (those you've put on double-secret probation) are safe via a different password. This isn't a cat and mouse game anymore--people who want to hide data have already won, just not everyone knows the right techniques to use. "A mystery wrapped in an Enigma is no more puzzling to Bruce Schneier than a mystery wrapped in ROT-13." http://geekz.co.uk/schneierfacts/fact/22 -- * Greg Smith gsmith@gregsmith.com http://www.gregsmith.com Baltimore, MD