Security Basics mailing list archives
FW: The ugly side of using disk encryption
From: "Isaac Van Name" <ivanname () southerlandsleep com>
Date: Fri, 20 Oct 2006 12:37:53 -0500
-----Original Message----- From: Isaac Van Name [mailto:ivanname () southerlandsleep com] Sent: Friday, October 20, 2006 12:37 PM To: 'Saqib Ali' Subject: RE: The ugly side of using disk encryption Great... so, when the ISP hosting a website you used XSS on reports you to the police with their log files as evidence, your computer is seized, encryption is found, and you're in jail for over 10 years even though the encryption had nothing to do with the crime. On a further note, how exactly would you determine that the encryption was "covering up misdeeds" if you can't decrypt it? It still sounds to me like a future law just waiting to be abused. Isaac Van Name Systems Administrator Southerland, Inc. ivanname () southerlandsleep com "What good would you do with an ignorant employee? Ignorance is grounds for dismissal..." - Mario Spinthiras Open Source developing at its finest: "Written in vim, W3C valid and UTF-8 encoded, for her pleasure." Disclaimer: This email is intended only to be used to feign intellectual mastery of a subject or superhuman command of the English language, when profanity is involved. By reading this email, you are agreeing to cease all correspondence with the sender upon realizing your own ignorance, and furthermore to refrain from taking legal action against said sender when your compounding ignorance crushes your inadequate self-esteem. Have a nice day. Original> -----Original Message----- Original> From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] Original> On Behalf Of Saqib Ali Original> Sent: Thursday, October 19, 2006 1:23 PM Original> To: Hagen, Eric Original> Cc: security-basics Original> Subject: Re: The ugly side of using disk encryption Original> Original> > John Ashcroft attempted to pass a law a few years ago that would have Original> made "use of encryption" a felony that could be added to any other crime to Original> get 3-5 years tacked on to the end of it. Fortunately the bill stalled and Original> has never been brought back up. -- Original> Original> a little twist: Original> Original> how about if you are found guilty and you were using encryption to Original> cover up misdeeds, tack on additional 10-15 years. DA can use that Original> additional 10-15 yr as a bargaining tool to get access to encrypted Original> data. Original> Original> ----- Original> Saqib Ali, CISSP, ISSAP Original> http://www.full-disk-encryption.net Original> Original> --------------------------------------------------------------------------- Original> This list is sponsored by: Norwich University Original> Original> EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE Original> The NSA has designated Norwich University a center of Academic Original> Excellence Original> in Information Security. Our program offers unparalleled Infosec Original> management Original> education and the case study affords you unmatched consulting Original> experience. Original> Using interactive e-Learning technology, you can earn this esteemed Original> degree, Original> without disrupting your career or home life. Original> Original> http://www.msia.norwich.edu/secfocus Original> --------------------------------------------------------------------------- Original> --------------------------------------------------------------------------- This list is sponsored by: Norwich University EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life. http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
Current thread:
- Re: The ugly side of using disk encryption, (continued)
- Re: The ugly side of using disk encryption Saqib Ali (Oct 20)
- Re: The ugly side of using disk encryption Ansgar -59cobalt- Wiechers (Oct 20)
- RE: The ugly side of using disk encryption Dan Anderson (Oct 20)
- RE: The ugly side of using disk encryption Robert D. Holtz - Lists (Oct 20)
- -Real- anonymity (was: The ugly side of using disk encryption) Michael Painter (Oct 20)
- RE: The ugly side of using disk encryption Hagen, Eric (Oct 20)
- Re: The ugly side of using disk encryption Saqib Ali (Oct 20)
- RE: The ugly side of using disk encryption Hagen, Eric (Oct 20)
- Re: RE: The ugly side of using disk encryption qxlr (Oct 23)
- RE: RE: The ugly side of using disk encryption Henry Troup (Oct 23)
- Re: RE: The ugly side of using disk encryption qxlr (Oct 23)
- FW: The ugly side of using disk encryption Isaac Van Name (Oct 20)
- RE: RE: The ugly side of using disk encryption Hagen, Eric (Oct 23)
- RE: The ugly side of using disk encryption Hagen, Eric (Oct 23)
- RE: The ugly side of using disk encryption Will Yonker (Oct 27)