So subject to offline attack, so even if he hadn't been intercepted I suspect the government would have got the data eventually
-
-
Replying to @josh_triplett
@josh_triplett@mjg59 He did say "offline attack" and by that I think he included trojaning the boot sector.1 reply 0 retweets 0 likes -
Replying to @martinkrafft
@martinkrafft@josh_triplett No, I think we could assume that DPR wasn't going to type in his passphrase again1 reply 0 retweets 0 likes -
Replying to @mjg59
@mjg59@josh_triplett so you think that dm_crypt can be brute-forced? How would a TPM prevent this?2 replies 0 retweets 0 likes -
Replying to @martinkrafft
@martinkrafft@josh_triplett Assuming the passphrase is in something that resembles language, the search space is much smaller5 replies 0 retweets 0 likes -
Replying to @mjg59
@mjg59@martinkrafft A passphrase with sufficient entropy, plus iterated hashing for >1 CPU second per attempt, ought to suffice.1 reply 2 retweets 0 likes -
Replying to @josh_triplett
@josh_triplett@mjg59@kragen Now write up the concrete best practices! Like that sshd document from the other day.2 replies 0 retweets 0 likes -
Replying to @martinkrafft
http://canonical.org/~kragen/cryptsetup … my notes on how to set up disk encryption securely for when your laptop is stolen
@martinkrafft@josh_triplett@mjg593 replies 4 retweets 6 likes
@kragen @martinkrafft @josh_triplett @mjg59 ECC for passwords is intriguing. Does anyone do it in practice? Other than caps lock ECC :-).
-
-
Replying to @danluu
@danluu@martinkrafft@josh_triplett@mjg59 I haven't heard of anybody doing ECC for passwords in practice, which is a shame.0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.