On 2010-04-04 05:58:10 -0500, The Lookout <the_lookout@nym.mixmin.net> said:
> "_C'0-SM-oS," <oezse@sats.com> wrote:
>> Hi lookout
>>
>> Interesting reading and thanks for the heads up note,
>>
>> I am not sure but this seems to relate to a computer that is up and
>> running but locked by the user
>>
>> Not sure if it works with ones that have been off or/and the drives
>> dismounted
>>
>> What is your understanding of the claims of the Software Company?
>>
>> Cosmos
>>
>>
>> One more example for not leaving a computer running and UN attended even
>> if its screen locked
>
> Hi Cosmos,
>
> It does require that the encrypted volume be mounted. I was thinking about
> how many of us rely on a passworded screensaver or 'Windows-L' when leaving
> our computer unattended for only a couple of minutes.
>
> We should make it a habit of dismounting and clearing cached passwords each
> and every time we step away.
>
> Take care,
> The Lookout
Here's a thought: Truecrypt allows you to use files as keyhashes
instead of an actual password. So what if you, for example, use 10
mp3's as keyhashes and have say, 5 mp3's burned on one disc and 5 on
another? When you want to mount, you just copy the mp3's onto your
harddrive and after you dismount, delete the mp3's.
|
| Follow-ups: | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
|