From: Rich Freeman <rich0@gentoo.org>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
Date: Mon, 2 Jun 2014 09:27:50 -0400 [thread overview]
Message-ID: <CAGfcS_=LiZGETvJjVb-rau=MkrYQTXRSvUYH3M_A1DUoF0L-bA@mail.gmail.com> (raw)
In-Reply-To: <538C68AE.5000504@gmail.com>
On Mon, Jun 2, 2014 at 8:06 AM, Dale <rdalek1967@gmail.com> wrote:
> Now that is wicked. Like I said, this could get crazy.
Meh. I don't encrypt my disks for desktops at home. My Chromebook
comes encrypted out-of-the-box (no doubt the NSA can have it unlocked
on request). If I had any other laptops I'd probably use full-disk
encryption of some kind on it.
My threat model for disk encryption is that somebody steals my laptop
and wants to rummage for passwords/credit card numbers/etc. If they
stole my desktop they'd probably give up when they find the data is
stored on btrfs in raid1 mode, and even the vanilla ext4 backup disk
probably would deter them, but if they're stealing my desktop they're
probably stealing my passport, birth certificates, and all that other
good stuff anyway.
As far as the NSA sending Ninjas through the windows goes, I really
see the threat there as having two levels. One is that the NSA does
pervasive monitoring of virtually everything they can get their hands
on to look for trends/etc. The other is that the NSA has a specific
interest in you, for whatever reason.
For general NSA monitoring simply using https/TLS/etc is about as good
as you're going to get. Chances are they aren't interested in
attacking your PC due to the economics of it, and if they use
zero-days widely there is a risk of them being detected (and thus the
bug they exploit gets fixed and they have to find another). They
probably read any unencrypted packets that go through a router at any
of the big choke points - probably a substantial part of the total
volume crossing the internet. They probably do not store most of that
data - they look for whatever they look for and discard the rest.
They probably have root on major service provider networks (either
with or without cooperation), so they're reading your
Gmail/Facebook/etc, so they really don't care if you use https to
connect to those services.
If you're a target of interest then the gloves come off, depending on
just how interesting you are. Most likely you're going to be targeted
for a remote exploit with professional management of a rootkit on your
devices. All your network traffic might be captured and retained. If
you're really interesting they might send the ninjas at night. You
get all those nice value-added-services like pre-installed rootkits in
any hardware you buy, probably from any vendor as long as it passes
through a country that is US-friendly (which is just about
everywhere).
If you're looking to evade general monitoring your best bet is to not
communicate with anybody who isn't as paranoid as you are. You
probably should refrain from posting on lists like this one, as they
are recording the people you correspond with to determine what sort of
person you are. Honestly, you're best off not using the Internet at
all, since there isn't anybody you can talk to who won't leak
everything to the NSA unwittingly. However, the reality is that most
of us are pretty boring, so the NSA probably doesn't care what we do.
If you're looking to evade specific monitoring then I don't know what
to tell you. They targeted the Iranian uranium enrichment program and
that was behind a sneakernet. I suspect that they have different
levels of effort for various targets. For example, Snowden revealed
that the NSA looks to root boxes belonging to sysadmins who have
access to services they're interested in - so if they wanted to poke
around on the Gentoo forum logs to find IPs they might look to root
members of infra, even though the members of infra aren't of interest
otherwise. I run a tor relay and I wouldn't be surprised if they
rooted my box as a result - rooting all the tor relays would allow
them to de-anonymize tor completely. Sure, you can wire up the door
to drop your server in a vat of acid, but that doesn't help if they
have a zero-day for your server.
Honestly, I just don't worry about it. If they want to root me, I
doubt worrying about it is going to change anything. I'd rather if
they didn't, or if they are going to do it anyway I wish that I could
just ask them to send me a copy of my data so that I could stop
worrying about running my own backups.
Rich
next prev parent reply other threads:[~2014-06-02 13:27 UTC|newest]
Thread overview: 52+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-06-01 12:31 [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet? Tanstaafl
2014-06-01 17:45 ` Volker Armin Hemmann
2014-06-02 8:22 ` Dale
2014-06-02 8:53 ` Michael Hampicke
2014-06-02 9:20 ` Neil Bothwick
2014-06-02 10:24 ` Michael Hampicke
2014-06-02 11:34 ` Mark David Dumlao
2014-06-02 12:27 ` Neil Bothwick
2014-06-02 9:24 ` Volker Armin Hemmann
2014-06-02 9:34 ` Neil Bothwick
2014-06-02 9:48 ` Dale
2014-06-02 10:06 ` Alan McKinnon
2014-06-02 10:27 ` Dale
2014-06-02 10:56 ` Neil Bothwick
2014-06-02 11:04 ` Dale
2014-06-02 11:10 ` Neil Bothwick
2014-06-02 11:33 ` Dale
2014-06-02 13:23 ` J. Roeleveld
2014-06-02 11:28 ` Rich Freeman
2014-06-02 12:06 ` Dale
2014-06-02 12:28 ` Michael Hampicke
2014-06-02 12:30 ` Matti Nykyri
2014-06-02 13:27 ` Rich Freeman [this message]
2014-06-02 13:40 ` J. Roeleveld
2014-06-02 12:23 ` Matti Nykyri
2014-06-02 12:36 ` godzil
2014-06-02 12:58 ` Matti Nykyri
2014-06-02 13:29 ` godzil
2014-06-02 14:52 ` J. Roeleveld
2014-06-02 13:23 ` Matti Nykyri
2014-06-02 15:29 ` J. Roeleveld
2014-06-03 18:53 ` Matti Nykyri
2014-06-03 21:05 ` J. Roeleveld
2014-06-03 19:53 ` Matti Nykyri
2014-06-03 21:27 ` Matti Nykyri
2014-06-02 18:14 ` Volker Armin Hemmann
2014-06-02 17:14 ` Volker Armin Hemmann
2014-06-02 19:26 ` J. Roeleveld
2014-06-02 13:22 ` J. Roeleveld
2014-06-02 16:54 ` Volker Armin Hemmann
2014-06-02 10:43 ` Rich Freeman
2014-06-02 10:54 ` Neil Bothwick
2014-06-04 19:59 ` Frank Steinmetzger
2014-06-04 23:24 ` Neil Bothwick
2014-06-05 16:52 ` Frank Steinmetzger
2014-06-05 16:57 ` Rich Freeman
2014-06-02 10:22 ` Tanstaafl
2014-06-02 10:57 ` Volker Armin Hemmann
2014-06-03 7:17 ` Marc Stürmer
2014-06-03 10:00 ` Tanstaafl
2014-06-03 12:02 ` Mick
2014-06-03 19:59 ` Marc Stürmer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CAGfcS_=LiZGETvJjVb-rau=MkrYQTXRSvUYH3M_A1DUoF0L-bA@mail.gmail.com' \
--to=rich0@gentoo.org \
--cc=gentoo-user@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox