13:11 Cryptography the price issue | |
"Torture in practical terms is meaningless to apply in advance if you do not know the answer." (C) too lazy to look for someone. Inspired by fasting encrypt the complete I will not condemn the implementation, I am more interested here are pompous thinking (not the author, but generally when they start to discuss the encryption of data) about "how cool I am, and who will apply to me TRC, and how to tell left password and proudly I can not sit on your ass and normal to shit until the end of life but the data did not betray the " grow up dakogo! TRC to you will apply only if they know that you have data that must be applied dispensers. (For example if you accidentally left the only copy of the accounting base of really big companies) do you imagine the level of access necessary to do this? Well, bang all the backup, bang the main base, distributed copies of what else is there? You understand that any person who has at least some head on her shoulders would not even think about this way to achieve something? .. Even if you own something less than a state secret, then tell us about all the ways of extracting information from your drive only when a soldering iron, I'm not talking about what you tell us after use. Next TRC - not a single method, you may like to buy, "and you should not say that you do not sell, you just do not put a price" (c), "one friend bezopasnik, at least almost all have relatives, for whose lives you could tell even then that (as a true partisan) would not have told at TRC. I've said nothing about what the analysis is performed on copies of the disc. So fairy tales that left the password, you can delete these stories will remain. Practical application of steganography is limited correspondence. And it somehow remembered in the information store, do not you understand that in case of storage projected for the possibility of TRC is also not a panacea, as if they know that you have stolen data, the data on your disk for some reason there is no TRC will continue to achieve positive results, by the way intersects with steganography storage disk imaging left servak ??in the internet and although I think it's the cleanest way (shooting vps encrypt a partition there, look for wind in the field, and the data in the internet) you will "remember" and IP and password and file name. Therefore if you really need to encrypt something, you have to throw away all the tools like trukript because the encryption system should consider the following items: 1. Inability to decipher in the case of TRC. 2. Inability to decipher in the case of hostage taking. 3. Those who need your data should be aware of this particular system (and then wonder how much hurt your Globe location or relatives). 4. Well understood cryptographic strength there and so on) In general, I certainly could be wrong) Because wishing to propose to describe the system meets the above requirements for the home user. (It is clear that the corporate / state implementation exist, but are not interesting, because the home user does not have a proper infrastructure and security service;)) Well at the very least let's options when you really need / can be useful steganographic kriptokonteyner. (Nonsense type of child porn and does not offer Varese) or write to me (not) encrypts the data because ... Shl. The only thing that comes to mind the physical destruction of the disk, but how to prove that you did not make a copy and store it somewhere in the left gmeyle for example? huh? ZZY. I do not mean such as encryption on the laptop or on a flash drive in case of loss, is a separate issue, and of course MUST hev. _________ The text was drafted in HabraRedaktore | |
|
Total comments: 0 | |