Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:VeraCrypt (Score 1) 114

Also, a "linux geek" would have already have taken dm-crypt as an alternative, or performed the instructions in some Full Disk Encryption Howto.

Isn't it built into the installer nowadays? I installed Debian recently and it offered to encrypt my system, but maybe it skipped the partition that holds /bin and whatnot...

Comment Re:Misleading and Hyperbolic Title/Comparison (Score 1) 130

How do you get shell access on your average Mac without physical access? SSH isn't enabled by default as has been pointed out. In fact, it's been a real PITA to get the versions of OS X I've configured to play nice on the network for the command line. I doubt one user in a thousand has done it -- slashdot mac users not being significantly representative of the average mac users, of course. My macs have SSH available, but the port isn't open to the Intertubes outside of my LAN, so it doesn't concern me very much.

So this essentially resolves to a "you have to be there" exploit.

Comment Random data point (Score 1) 174

Bees are all over the place at my home (basically at the center of a small town in rural Montana.) We have quite a few planters full of flowers on our largish deck (about 1000' sq), and it is not uncommon to go out there and see a very large number of bees going about their business. They are nearly zero threat. Well, unless you sit on one. :) We try not to do that.

There are no obvious hives anywhere nearby, and they seem to come and go from all points of the compass.

Sortof-kinda related, there are local honey merchants, and the honey is just lovely.

Comment Re:Misleading and Hyperbolic Title/Comparison (Score 3, Insightful) 130

Furthermore, local access pretty much is the end of the road anyway. Boot from the right CD with a custom filesystem that ignores HD filesystem permissions and yet allows you to set them any way you want, system is now wide open. Replace a few choice commands that you know are going to run, and bang, fully compromised. And that's just one of the many easy ways in to access as the system stands. You can also copy off the entire HD, or for that matter, erase it. Or both. You can compromise a command for a way in, copy an otherwise encrypted volume and walk off with it, break the encryption at your leisure, then use the previously installed compromise to get in and cause mayhem.

If you don't have physical security and there is any kind of local threat of compromise, you could become toast at any time. These kinds of "threats" are insignificant in the larger scheme of things. If you need local security, the only sufficient mechanism is to physically deny access to the computer.

Slashdot Top Deals

6 Curses = 1 Hexahex

Working...