<br><br><div class="gmail_quote">On Sat, Dec 31, 2011 at 11:53 AM, David Tomaschik <span dir="ltr"><<a href="mailto:david@systemoverlord.com">david@systemoverlord.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im">On Sat, Dec 31, 2011 at 9:12 AM, Jim Kinney <<a href="mailto:jim.kinney@gmail.com">jim.kinney@gmail.com</a>> wrote:<br>
> The big headache is the time required to maintain the integrity of the data.<br>
> As was pointed out earlier, encryption is a problem looking to happen. Save<br>
> yourself the headache and buy a data safe instead and park the archives<br>
> there. Unless the data is clearance level stuff now and already stored<br>
> encrypted, don't bother. If the media is stolen, the encryption WILL be<br>
> cracked so it only make the maintenance cycle worse.<br>
<br>
</div>I've got to disagree here. The most likely scenario for a theft of<br>
your drives is a common house burglar. They might plug a hard drive<br>
in or see whats on a DVD, but they're certainly not going to break<br>
encryption. I have plenty of data I don't want anyone perusing<br>
(mostly financial data -- 1040s, W2s, paystubs, etc.) and LUKS<br>
encryption on the hard drives my backups reside on should be plenty to<br>
deter "casual" snooping if the drive gets stolen.<br></blockquote><div><br>Point taken. If they went through my safe to get the backups, they are likely sophisticated enough to also use the wrench process to get the key from as well. So I rely on physical security for archives and encryption for mobile data. <br>
</div><blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Plus, if the drive is encrypted and later fails, you don't have to<br>
worry about whether there's some data that's still recoverable, etc.<br></blockquote><div><br>Old drive platters make nice wind chimes :-) <br></div><blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
The only entities with the resources to break any currently decent<br>
cryptosystem (e.g., 128-bit AES) are large corporations and<br>
governments, and they'll just use the WRENCH method for decryption:<br>
<a href="http://xkcd.com/538/" target="_blank">http://xkcd.com/538/</a><br></blockquote><div><br>Thus all my pr0n is encrypted to give them something to sort through :-D <br></div><blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<span class="HOEnZb"><font color="#888888"><br>
--<br>
David Tomaschik, RHCE, LPIC-1<br>
System Administrator/Open Source Advocate<br>
OpenPGP: 0x5DEA789B<br>
<a href="http://systemoverlord.com" target="_blank">http://systemoverlord.com</a><br>
<a href="mailto:david@systemoverlord.com">david@systemoverlord.com</a><br>
</font></span><div class="HOEnZb"><div class="h5">_______________________________________________<br>
Ale mailing list<br>
<a href="mailto:Ale@ale.org">Ale@ale.org</a><br>
<a href="http://mail.ale.org/mailman/listinfo/ale" target="_blank">http://mail.ale.org/mailman/listinfo/ale</a><br>
See JOBS, ANNOUNCE and SCHOOLS lists at<br>
<a href="http://mail.ale.org/mailman/listinfo" target="_blank">http://mail.ale.org/mailman/listinfo</a><br>
</div></div></blockquote></div><br><br clear="all"><br>-- <br>-- <br>James P. Kinney III<br><br>As long as the general population is passive, apathetic, diverted to
consumerism or hatred of the vulnerable, then the powerful can do as
they please, and those who survive will be left to contemplate the
outcome.<br>- <i><i><i><i>2011 Noam Chomsky<br><br><a href="http://heretothereideas.blogspot.com/" target="_blank">http://heretothereideas.blogspot.com/</a><br></i></i></i></i><br>