-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 2015-07-27 05:05, Anton Aylward wrote:
On 07/26/2015 10:25 PM, Carlos E. R. wrote:
Well, yes, having .fetchmail on a encrypted partition is a second order pseudo-secret. When you are logged in and active that partition is "unlocked" so you can use it. Not exactly, because you need to enter a password to open the partition at some point.
Once again I refer you to the John Sandford novel. The laptop was stolen while the main user was logged in and had opened up the encrypted user partition.
Well, even if I got that novel, it would go to the end of my reading queue, so I would not read it till a month. You will have to explain how he does it. Assume the laptop is running, with the encrypted spaces open, yes. When a laptop is stolen it is normally suspended/hibernated, and inside a bag or on a table, while the owner is somewhere else. Meaning that the screen is locked, so the thieve can not access the running system. There is no access to the running session unless he knows the user password, and no access via network without password, unless he knows of a suitable security hole.
UNLESS you have some kind of scripting that says 'open encrypted partition using keyword; extract passwords; close encrypted partition; forget keyword' then all is lost.
Actually that is what I intend to do. Have an encrypted file, prompt for a password, and create a clear text copy of the file in tmpfs, so that it is automatically lost on power down or reboot. - -- Cheers / Saludos, Carlos E. R. (from 13.1 x86_64 "Bottle" (Minas Tirith)) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iF4EAREIAAYFAlW2GdcACgkQja8UbcUWM1w7gQEAiaEdmBijiHF4LYQJuK7PvK4Q 2TFKgkJ3PZTnZKUEum4A/iPVjNYxBPIXaKCRPJzsU4yOY4paawfdofMYu42rL7lm =YJGW -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org