On Thu, 2008-11-13 at 23:23 +0900, Osamu Aoki wrote:
> Encryption key has 128 bit strength since it is generated from
> /dev/urandom and there is no established script to go over them to check
> if one possible key is the one used for encryption. This makes it
> practically impossible to try to ru
Hi,
Thanks for providing interesting package and accepting good part of my
proposal.
For the record...
I agree that if you chose good password, your eCrypted folder is safe.
But how often do we have such good one :)
Encryption key has 128 bit strength since it is generated from
/dev/urandom and
On Tue, 2008-11-11 at 01:15 +0900, Osamu Aoki wrote:
> Unless you wish to use PAM, I see no advantage to use login passphrase
> to wrap encryption keys. I think that really beat the purpose of this
> kernel module in terms of security of data after PC is stolen.
I disagree that it defeats the pur
Package: ecryptfs-utils
Version: 64-3
tags 505008 patch
Followup-For: Bug #505008
Unless you wish to use PAM, I see no advantage to use login passphrase
to wrap encryption keys. I think that really beat the purpose of this
kernel module in terms of security of data after PC is stolen.
This can b
Hi,
As for
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
5 matches
Mail list logo