That was supposed to be "shot in the arm", not short. Oh well.
I just found the article interesting because it seems like I regularly
run into people that tell me that encryption on computers is pointless
because the government can crack anything out there in short order.
I do believe the government does have the resources to break a lot of
it. Somewhere they might actually have what it takes to crack was was
talked about in the article. I think stuff has to be of a high enough
priority for the government expend the required resources.
I don't believe there is any lock out there that is 100% secure. Whether
it is on a computer, your front door, or securing your snowmachine.
What we can do is make it secure enough the the effort expended to get
the prize is more costly than what the prize is worth.
I don't believe I have, or likely ever will have, anything the FBI will
spend a year of resources to breach.
On Mon, 2010-06-28 at 04:32 +0800, Bruce Hill wrote:
> On Sat, Jun 26, 2010 at 02:34:59PM -0800, Jim Gribbin wrote:
> > "The FBI failed to break the encryption code of hard drives seized by
> > federal police at the apartment of banker Daniel Dantas,..."
> >
> > "... the two programs used in the equipment are available online. One is
> > called Truecrypt and is free..."
> >
> > http://g1.globo.com/English/noticia/2010/06/not-even-fbi-can-de-crypt-files-daniel-dantas.html
> >
> > Trucrypt is available in the standard Fedora repositories under the name
> > Realcrypt. The package desription states that it is Truecrypt, they just
> > had to re-brand it to make some changes. I would imagine it is available
> > for most other distros as well.
> >
> > Jim G
>
> All my marbles are on LUKS:
>
> http://code.google.com/p/cryptsetup/
>
> Bruce
---------
To unsubscribe, send email to <aklug-request@aklug.org>
with 'unsubscribe' in the message body.
Received on Sun Jun 27 15:51:40 2010
This archive was generated by hypermail 2.1.8 : Sun Jun 27 2010 - 15:51:40 AKDT