On 31/01/12 13:10, zep wrote:
When I installed 12.1 I encrypted (for the first time) my HOME directory.
Last night, in anticipation of installing KDE 4.8, I did a backup of my /home to an external HDD.
Then the thought occurred to me - which is as a result of a court case in USA where the judge ruled that the Fifth Amendment did not apply where the woman refused to divulge the passphrase to her encrypted system and she had to type in the passphrase to make the contents of the HDD available to the DoJ - is my encrypted data now readable on the external HDD?
The answer is YES. I attached the external to another computer and am able to read all the files in that backup.
On 1/30/2012 7:44 PM, Basil Chupin wrote: perhaps it's a good time for the very paranoid to switch to hidden encrypted partitions with truecrypt (www.truecrypt.org).
the basic premise is there are 2 separate, mountable partitions within an single encrypted file. password A opens and allows partition A to be mounted, password B opens and allows a smaller subset partition to be mounted, giving plausible deniability if forced to divulge a password.
From where I am sitting, this is as useless as the encryption which I am now using on my /home directory. It doesn't matter how many partitions and layers of wotnots you have - they will only work on the CURRENT system and partitions. Copy files to another medium and.....anyone can read them. The only way that this encryption would work is to encrypt each and every FILE with some GPG, or similar, key. But what would be the overhead, eh?! :-( Of course I have no idea how this encryption works in openSUSE and it may just be a bug in the encryption system in 12.1 - I just don't know. All I know at the moment is what I learnt earlier today from personal experience. BC -- The wise man does at once what a fool does finally. Niccolo Machiavelli -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org