Some legal trouble with TOR in France

Jacob Yocom-Piatt dick at uchicago.edu
Mon May 15 14:11:47 UTC 2006


---- Original message ----
>Date: Mon, 15 May 2006 18:52:38 +1000
>From: glymr <glymr_darkmoon at ml1.net>  
>Subject: Re: Some legal trouble with TOR in France  
>To: or-talk at freehaven.net
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: RIPEMD160
>
>Matej Kovacic wrote:
>> Hi,
>> 
>> this could also be a good idea:
>> http://www.ubuntuforums.org/showthread.php?t=120097&highlight=cryptsetup
>> 
>> encryption of harddrives from the scratch.
>> 
>> However, I would create a small partition where there will be keys
>> (files) for decryptig root and home partitions. This small partition
>> would be encrypted by passphrase. That means you can easily (well...
>> :-//) change your passphrase for the system (just re-encrypt this small
>> partition with keyfiles againg).
>> 

i am to understand that it's a bit of a mess to have the root partition of any
*nix machine encrypted. netbsd's cgd is pretty solid, provided one only puts
sensitive data on it post cgd setup. cgd only works for non-root partitions.

>> The only critical software part is then /boot partition. But you can
>> always fill the /boot up to 100% with random data and run Tripwire
>> integrity checking on it. If it is full, it is hard to write additional
>> code on it. And if you do integrity checking, you can easily discover if
>> something changed.
>> 
>> I am planning to write a small setup guide for cryptsetup on Dapper
>> version of Ubuntu Linux.
>> 
>> bye, Matej
>
>ever heard of cryptfs_luks?



More information about the tor-talk mailing list