<p>If you are willing to trust such a thing. I would much rather control the security parameters, and not use the easiest biometric to forge...</p>
<p>After all, it is too easy to lift and reuse someone's fingerprint. Just too easy.</p>
<p>--<br>
Sent from my G2.</p>
<div class="gmail_quote">On Oct 13, 2010 7:03 PM, "Greg Freemyer" <<a href="mailto:greg.freemyer@gmail.com">greg.freemyer@gmail.com</a>> wrote:<br type="attribution">> Does using an encrypting hard drive count?<br>
> <br>> I'm not sure about servers, but lots of laptops now have harddrives<br>> with built in encryption engines.<br>> <br>> The bios on those laptops tend to ask the user for a password (or<br>> fingerprint) that is fed into the drive so it can be booted from.<br>
> <br>> Here's the first one I found via google:<br>> <a href="http://www-307.ibm.com/pc/support/site.wss/MIGR-71843.html">http://www-307.ibm.com/pc/support/site.wss/MIGR-71843.html</a><br>> <br>> Greg<br>
> <br>> On Wed, Oct 13, 2010 at 4:32 PM, Jim Butler<br>> <<a href="mailto:jimbutler1234567890@gmail.com">jimbutler1234567890@gmail.com</a>> wrote:<br>>> Hi Linux People!<br>>> I have a question and am looking for some experienced suggestions.<br>
>> I saw a server recently that had filesystem encryption applied to the<br>>> entire root filesystem volume.<br>>> Although I am not sure, I do believe that the encryption scheme probably<br>>> was not loopback (cryptoloop) because the server did not have a key<br>
>> stored on an external device. My understanding of loopback encryption is<br>>> that the kernel and initrd have to be stored on at least some kind of<br>>> un-encrypted media in order to boot to at least a small level sufficient<br>
>> to ask for the pass-key to decrypt/mount the filesystem.<br>>> If the encryption scheme wasn't loopback encryption, what could it have<br>>> been? What ways are popular right now for encrypting an entire root<br>
>> filesystem without using a thumbdrive or other external storage??<br>>> If someone can help me identify what this was, maybe I can read up on it<br>>> and implement it on one of my own servers.<br>>><br>
>> Thanks in advance,<br>>> Jim Butler<br>>> Linux Network Administrator.<br>>><br>>> _______________________________________________<br>>> Ale mailing list<br>>> <a href="mailto:Ale@ale.org">Ale@ale.org</a><br>
>> <a href="http://mail.ale.org/mailman/listinfo/ale">http://mail.ale.org/mailman/listinfo/ale</a><br>>> See JOBS, ANNOUNCE and SCHOOLS lists at<br>>> <a href="http://mail.ale.org/mailman/listinfo">http://mail.ale.org/mailman/listinfo</a><br>
>><br>> <br>> <br>> <br>> -- <br>> Greg Freemyer<br>> Head of EDD Tape Extraction and Processing team<br>> Litigation Triage Solutions Specialist<br>> <a href="http://www.linkedin.com/in/gregfreemyer">http://www.linkedin.com/in/gregfreemyer</a><br>
> CNN/TruTV Aired Forensic Imaging Demo -<br>> <a href="http://insession.blogs.cnn.com/2010/03/23/how-computer-evidence-gets-retrieved/">http://insession.blogs.cnn.com/2010/03/23/how-computer-evidence-gets-retrieved/</a><br>
> <br>> The Norcross Group<br>> The Intersection of Evidence & Technology<br>> <a href="http://www.norcrossgroup.com">http://www.norcrossgroup.com</a><br>> <br>> _______________________________________________<br>
> Ale mailing list<br>> <a href="mailto:Ale@ale.org">Ale@ale.org</a><br>> <a href="http://mail.ale.org/mailman/listinfo/ale">http://mail.ale.org/mailman/listinfo/ale</a><br>> See JOBS, ANNOUNCE and SCHOOLS lists at<br>
> <a href="http://mail.ale.org/mailman/listinfo">http://mail.ale.org/mailman/listinfo</a><br></div>