On Mon, 6 Aug 2001 23:45:33 -0700 (PDT)
Ryan Mack <firstname.lastname@example.org> wrote:
>> Hmmm, let us suppose, that i copy your crypted partition per bit to my
>> After it I will disassemble your decrypt programm and will find a key....
>> In any case, if anyone have crypted data, he MUST decrypt them.
>> And for it he MUST have some key.
>> If this is a software key, it MUST NOT be encrypted( it's obviously,
>> becouse in other case, what will decrypt this key?) and anyone, who have
>> PHYSICAL access to the machine, can get this key.
>> Am I wrong?
RM> I think the point you are missing is that encrypted swap only needs to be
RM> accessible for one power cycle. Thus the computer can generate a key at
No, computer can not do this.
This will do some program,and this program is not crypted.
We disassemle this program, get algorithm and regenerate a key in evil machine?
Am i wrong?
P.S. off-topic What algorithm do you want to use to regenerate a key for once crypted data?
I don't know anyone, or i can't understand your point of view.
--- WBR. //s0mbre - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to email@example.com More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/