From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id CA15C1381FA for ; Mon, 2 Jun 2014 11:22:30 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 45BC6E0AF7; Mon, 2 Jun 2014 11:22:25 +0000 (UTC) Received: from smtpq2.gn.mail.iss.as9143.net (smtpq2.gn.mail.iss.as9143.net [212.54.34.165]) by pigeon.gentoo.org (Postfix) with ESMTP id 418C7E0AE4 for ; Mon, 2 Jun 2014 11:22:24 +0000 (UTC) Received: from [212.54.34.134] (helo=smtp3.gn.mail.iss.as9143.net) by smtpq2.gn.mail.iss.as9143.net with esmtp (Exim 4.71) (envelope-from ) id 1WrQJr-0007l8-My for gentoo-user@lists.gentoo.org; Mon, 02 Jun 2014 13:22:23 +0200 Received: from 53579160.cm-6-8c.dynamic.ziggo.nl ([83.87.145.96] helo=data.antarean.org) by smtp3.gn.mail.iss.as9143.net with esmtp (Exim 4.71) (envelope-from ) id 1WrQJr-0003sA-DD for gentoo-user@lists.gentoo.org; Mon, 02 Jun 2014 13:22:23 +0200 Received: from andromeda.localnet (unknown [213.19.196.10]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by data.antarean.org (Postfix) with ESMTPSA id C0A1A4C for ; Mon, 2 Jun 2014 13:21:44 +0200 (CEST) From: "J. Roeleveld" To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet? Date: Mon, 02 Jun 2014 13:22:12 +0000 Message-ID: <2569214.A3GhSEgEqC@andromeda> Organization: Antarean User-Agent: KMail/4.12.5 (Linux/3.12.13-gentoo; KDE/4.12.5; x86_64; ; ) In-Reply-To: <20140602115624.214cbdbe@hactar.digimed.co.uk> References: <538B1D0A.9070405@libertytrek.org> <538C51A0.8050903@gmail.com> <20140602115624.214cbdbe@hactar.digimed.co.uk> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Ziggo-spambar: ---- X-Ziggo-spamscore: -4.9 X-Ziggo-spamreport: ALL_TRUSTED=-1,BAYES_00=-1.9,PROLO_TRUST_RDNS=-3,RDNS_DYNAMIC=0.982 X-Ziggo-Spam-Status: No X-Spam-Status: No X-Spam-Flag: No X-Archives-Salt: 8fd64a32-24e4-4baf-a6fe-142250ccaf8d X-Archives-Hash: 652056cf5e87b372744995959e64f123 On Monday, June 02, 2014 11:56:24 AM Neil Bothwick wrote: > On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote: > > The second option does sound what I am looking for. Basically, if I log > > out but leave my computer on, leave home, some crook/NSA type breaks in > > and tries to access something or steals my whole puter, they would just > > get garbage for data. That seems to fit the second option best. > > If they steal your computer they will have to power it off, unless you > are kind enough to leave them a large enough UPS to steal along with it, > so any encryption will be equally effective. You only need a UPS that can keep a machine running for about a few minutes. First start the portable generator, then unplug the UPS from the wall and plug it into the portable generator. Then when in the car/van/truck/... plug it over from the portable generator into a 12V / 24V -> 120/240V DC/AC converter and drive to a location where you have the tools to hack into a running machine. Best configure the machine to auto-power-down when it looses connection to a fixed device in your home, like the smart meter, bluetooth headset,... or anything else that has a built-in wireless capability. -- Joost