public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
From: Chris Walters <cjw2004d@comcast.net>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] loop-aes + extra-ciphers...
Date: Wed, 25 Jun 2008 11:14:20 -0400	[thread overview]
Message-ID: <486260CC.109@comcast.net> (raw)
In-Reply-To: <20080625162022.5c4d5e35@ilievnet.com>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Daniel Iliev wrote:
| On Tue, 24 Jun 2008 22:20:20 -0400
| Chris Walters <cjw2004d@comcast.net> wrote:
[snip]
| Perhaps they appear as kernel modules? I'm just guessing.

I think that is how they are supposed to appear, but I can't seem to get them
to compile, and the instructions are not too helpful.

[snip]

| Yes, you can have multiple passwords with dm-crypt-luks.

That is good.
[snip

| Never bothered to go so deep in the internals, but...
|
| I had a busyness laptop with non-sensitive (in my opinion) data, but
| the managers were quite paranoid about that, so I had to encrypt the
| drives to save myself the administrative trouble in case it was stolen.
| I followed the gentoo-wiki how-to [1] and found out that encrypting the
| hdd visibly slowed down the system.
|
| Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
| etc) can break those algorithms relatively easy. On the other hand even
| weaker algorithms can protect your data against laptop thieves.

That's more than a rumor.  Another three letter agency (NSA) has networks of
supercomputers that can brute force a passphrase is little time.  I am majoring
in mathematics, and plan to specialize in cryptology.  I doubt they'd let me
publish an algorithm that is very hard to break...  It is not that I'm terribly
paranoid about people getting my data, I just want to make it a little harder.
Of course, it is always possible to insert code that will send the unencrypted
data, once you've logged on - not easy for the casual user, but for the guru,
an easy thing.

| What I'm saying is that it is pointless to get very crazy about strong
| and heavy algorithms. After all if your enemies are not after your
| hardware, but after your data, they could always physically force you
| to reveal the password.

Yes, I suppose that they could do that, using torture or something like that.

[snip]
| Yes, you could do something like:
|
| head /dev/urandom | gpg --symmetric -a > key.gpg
| gpg --decrypt key.gpg | cryptsetup luksFormat /dev/some-block-device
| gpg --decrypt key.gpg | cryptsetup luksOpen /dev/some-block-device
|
|
| (The above commands are not correct, their sole purpose is to show the
| idea)

Thanks for the ideas, and for the links.  I will be checking them out.

| [1] System Encryption DM-Crypt with LUKS: http://tinyurl.com/clrk6
|
| [2] M.A.V.O.: http://tinyurl.com/4badqs ; http://tinyurl.com/4chhph :D

Regards,
Chris
-----BEGIN PGP SIGNATURE-----
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=SUZm
-----END PGP SIGNATURE-----
-- 
gentoo-user@lists.gentoo.org mailing list



  reply	other threads:[~2008-06-25 15:14 UTC|newest]

Thread overview: 40+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-06-25  2:20 [gentoo-user] loop-aes + extra-ciphers Chris Walters
2008-06-25  5:43 ` Dirk Heinrichs
2008-06-25 13:20 ` Daniel Iliev
2008-06-25 15:14   ` Chris Walters [this message]
2008-06-25 18:51     ` Sebastian Wiesner
2008-06-25 20:25       ` Chris Walters
2008-06-25 21:24         ` Sebastian Wiesner
2008-06-25 21:53           ` Jason Rivard
2008-06-25 22:10             ` Sebastian Wiesner
2008-06-26  2:22               ` [gentoo-user] My last words on cryptology and cryptography Chris Walters
2008-06-26  8:54                 ` Alan McKinnon
2008-06-26 18:35                   ` kashani
2008-06-26 21:52                     ` Steven Lembark
2008-06-27  0:06                       ` kashani
2008-06-27 13:04                       ` Sebastian Wiesner
2008-06-26 20:14                   ` Sebastian Wiesner
2008-06-26 20:39                     ` Alan McKinnon
2008-06-26 22:10                       ` [gentoo-user] h Volker Armin Hemmann
2008-06-26 22:47                         ` Sebastian Günther
2008-06-26 23:37                           ` Neil Bothwick
2008-06-27  9:44                             ` Stroller
2008-06-27 10:08                               ` Neil Bothwick
2008-06-27 13:48                                 ` Alan McKinnon
2008-06-27 22:00                                   ` Chris Walters
2008-06-27 20:26                                 ` Daniel Iliev
2008-06-27  0:16                           ` Volker Armin Hemmann
2008-06-27  0:28                           ` kashani
2008-06-27  8:51                             ` Alan McKinnon
2008-06-27  8:59                               ` Neil Bothwick
2008-06-27 13:21                             ` Sebastian Wiesner
2008-06-27  8:42                         ` Alan McKinnon
  -- strict thread matches above, loose matches on Subject: below --
2008-06-25 17:58 [gentoo-user] loop-aes + extra-ciphers Dirk Heinrichs
2008-06-25 18:59 ` Alan McKinnon
2008-06-25 20:31 ` Chris Walters
2008-06-25 20:46   ` Alan McKinnon
2008-06-25 20:54     ` Chris Walters
2008-06-25 21:39       ` Alan McKinnon
2008-06-25 21:51         ` Chris Walters
2008-06-25 21:57           ` Jason Rivard
2008-06-25 22:45             ` Alan McKinnon

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=486260CC.109@comcast.net \
    --to=cjw2004d@comcast.net \
    --cc=gentoo-user@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox