On 3/16/2018 9:16 AM, Steven Maddox wrote:
> I get the impression they want the decryption happening on the end users
> machines.
>
> Presumably so that if any users got the idea to just 'upload' a file
> online - it'd be the encrypted version of that file. Course someone can
> just get around th
On 3/16/2018 9:15 AM, Andrew Gallagher wrote:
> How does that work when the decryption key is on the client?
I don't think it is on the client. The private key is stored on the
server and is decrypted when you log in. At least I think that's how it
works. I've never actually tried using EFS on
I get the impression they want the decryption happening on the end users
machines.
Presumably so that if any users got the idea to just 'upload' a file
online - it'd be the encrypted version of that file. Course someone can
just get around that by opening an encrypted file - then just saving it
t
> On 16 Mar 2018, at 13:07, Phil Susi wrote:
>
> I believe you can enable EFS on the windows server and it will handle
> decrypting the file before sending it over SMB. Then you don't need any
> special software or configuration on the clients.
How does that work when the decryption key is on
On 3/16/2018 4:11 AM, Steven Maddox wrote:
> Yeah I just use LUKS on my PC to protect local files, but this is (as
> above) for files on SMB/Windows shares... sorry for not mentioning that
> sooner.
I believe you can enable EFS on the windows server and it will handle
decrypting the file before se
> On 16 Mar 2018, at 08:11, Steven Maddox wrote:
>
> Yeah this would be a cool approach that'd mean less reliance on the
> kernel. However the files we (me and my colleagues) access (although
> they're all using Windows PCs) are on SMB/Windows shares... so somehow
> the overlay would have to wo
On 15/03/18 17:03, Phil Susi wrote:
> Windows has this feature built in already, why not just use that?
I'm not a Windows user, I mentioned that I'm a Linux desktop user in my
original post.
--
On 15/03/18 17:11, Andrew Gallagher wrote:
> The obvious approach would be to write a FUSE driver
Yea
On 03/15/2018 07:58 PM, gn...@raf.org wrote:
> yes, luks full disk encryption would be best of course but if
> boss says no, ecryptfs file system encryption might be
> acceptable. every file in an ecryptfs-mounted file system is
> individually encrypted. encrypting their names as well is
> optional
On Fri 2018-03-16 11:58:45 +1100, gn...@raf.org wrote:
> Daniel Kahn Gillmor wrote:
>> or, if what you really care about is file-level encryption on a
>> GNU/Linux desktop and you *don't* care about files being OpenPGP
>> formatted, you could look into ext4's native encryption features (see
>> e4cr
Daniel Kahn Gillmor wrote:
> On Thu 2018-03-15 17:11:15 +, Andrew Gallagher wrote:
> >> If this doesn't exist in the main GnuPG project then I'd be happy to be
> >> referred to any 3rd party bits of software (even if commercial or
> >> proprietary) that could?
> >>
> >> I understand if
On Thu 2018-03-15 17:11:15 +, Andrew Gallagher wrote:
>> If this doesn't exist in the main GnuPG project then I'd be happy to be
>> referred to any 3rd party bits of software (even if commercial or
>> proprietary) that could?
>>
>> I understand if the answer *should* be block-level e
On 15/03/18 15:26, Steven Maddox wrote:
>
> The desktop portion of that software has an OS/kernel level driver that
> watches if you're trying to open a PGP encrypted file... then decrypts
> it on the fly and finally passes it to the application that'd normally
> open it.
...
> If this doe
On 3/15/2018 11:26 AM, Steven Maddox wrote:
> The desktop portion of that software has an OS/kernel level driver that
> watches if you're trying to open a PGP encrypted file... then decrypts
> it on the fly and finally passes it to the application that'd normally
> open it.
> Anyway I can ei
Hi,
At the place I work they unfortunately use stupid Symantec's "Encryption
Desktop" (formerly known as PGP Desktop) software.
The desktop portion of that software has an OS/kernel level driver that
watches if you're trying to open a PGP encrypted file... then decrypts
14 matches
Mail list logo