<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div>Work? No question. I'm in financial services. To me, that is a different topic.</div><div><br></div><div>I'm talking about personal machine full-disk encryption.</div><div><br></div><div>Unless I'm going to extensive measures to hide a cache of pirated music or porn or other things that would be embarrassing if found, I fail to see the need for whole-disk encryption <b>IN MY CASE </b>(before anyone gets their panties in a twist). So, I asked to get some education on what folks might be using such tech for.</div><div><br></div><div>Am I familiar with it? Sure. Do I have sensitive docs? You betcha. I have a single image with all the goodies in it and use TrueCrypt on my Mac for the few things that shouldn't have prying eyes. </div><div><br></div><div>The whole-disk thing is what is a curiosity to me is all. Apple gives me the ability to encrypt my entire home directory, but not the volume. I'm sure that if I researched what the underlying BSD stuff they're using is, I could undertake the task of encrypting my whole volume.</div><div><br></div><div>Anywho, just curious.</div><div><br></div><div>Now, a different topic: I use a 2-key password scheme I picked up awhile ago. A portion is in my head and a portion comes from a password grid I've created (8x8, double-sided) that I carry in my wallet. I use patterns+private key. So, I could actually give you my password list, and you'd never guess it. I also impose on myself a 30-day password change as well. I even do this at home. Not a foolproof system, but secure enough since I don't ever login with any elevated privileges. I'm even in the "users" group only. </div><div><br></div><div>A couple more notes in-line below.</div><br><div><div>On Feb 11, 2011, at 9:05 AM, Greg Freemyer wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite"><div>Jerold,<br><br>You're a professional sys admin.<br><br>Whether you like it or not, today that means you are part of America's<br>counter-espionage team.<br>Yes, you are a spook's spook!<br></div></blockquote><div><br></div><div>I would not assist any agency or representative of the governmental intrusion squad even under threat of incarceration. If there was research into money or assets stolen from the company I work for, that's a different topic...I will assist to the limits of what my employer requests of me up to, but not further than what is needed to protect company assets or to apprehend said criminals.</div><div><br></div><br><blockquote type="cite"><div>So assume the bad guys crack your network and steal your login /<br>password. (Sys admin login/password is a much sought after goodie.)<br><br>Next assume they are willing to invest many man months crawling around<br>your network and getting to know it better than you do.<br><br>What corporate assets do you have privileges to that you don't want<br>them to have?<br><br>1) Anything you have related to security config in general.<br></div></blockquote><div><br></div><div>...which I would not be allowed to encrypt. I'm not part of the security team...</div><br><blockquote type="cite"><div><br>2) Network / server config docs.<br></div></blockquote><div><br></div><div>Hosted on that god-forsaken sharepoint travesty (last three companies, in fact!). Not my responsibility. </div><br><blockquote type="cite"><div><br>3) Specific intrusion / remediation details. Especially if a peer at<br>another company gave it to you.<br></div></blockquote><div><br></div><div>Remanded to the security department, and out of my jurisdiction where I am. Other companies vary, but now that you mention it, I *am* seeing a trend where security teams are slowly peeling away the hardening/post-mortem duties from Systems Admins, especially in the bigger companies. That doesn't bode well, methinks.</div></div><br><div>
<span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-family: Helvetica; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-size: medium; "><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-family: Helvetica; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-family: Helvetica; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">#!/jerald<br>Linux User #183003</div><div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Ubuntu User #32648</div><div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Public GPG Key: <a href="http://questy.org/js.asc">http://questy.org/js.asc</a><br><br>-----BEGIN GEEK CODE BLOCK-----<br>Version: 3.1<br>GIT/MU d-@ s++(++)>+++:> a+ C++++(+++)$>++ UBLAVHSC++(on)$>++++ P++(+++)$>++++ L++(++++)$>+++ !E---(---)>--- W+(++)$>+++ N(+)$>++ !o !K-- w(--)>--- O()@> M++(++)$>++ V()>- PS+++()@>-- PE(++)@>+ Y+(+)@>+ PGP++(++)$>+++ t+(++)@>+++ 5(+)@>+ X+(++)@>+++ R+(+)@>++ tv-(+)$>++ b+++(++)$>++ DI++++(++)>+++ D++(++)@>++ G++(++)@>++ e++(++)$>++ h(-)$>- r+++(+++)@>+++ y+(+++)>++++@ <br>------END GEEK CODE BLOCK------<br><br><br></div></span></div></span></span>
</div>
<br></body></html>