home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.os.linux.advocacy      Torvalds farts & fans know what he ate      164,974 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 163,834 of 164,974   
   CrudeSausage to Paul   
   Re: Microsoft gave FBI a set of Bitlocke   
   25 Jan 26 14:19:05   
   
   XPost: alt.comp.os.windows-11   
   From: crude@sausa.ge   
      
   On Sat, 24 Jan 2026 22:06:54 -0500, Paul wrote:   
      
   > On Sat, 1/24/2026 6:39 PM, CrudeSausage wrote:   
   >> On Sat, 24 Jan 2026 19:56:25 -0000, Bill Brownley wrote:   
   >>   
   >>> Alan K. wrote:   
   >>>   
   >>>> And ....   
   >>>> Is there a substitute for Bitlocker?   What if I don't want to use   
   >>>> it,   
   >>>> but still want encryption?   
   >>>   
   >>> Yes, lots.   
   >>>    
   >>>   
   >>>   
   >>> [Removed 张文尉's crosspost to alt.conspiracy]   
   >>   
   >> It seems that just about every solution there would be safer than   
   >> Microsoft's, but I imagine that VeraCrypt remains the most popular   
   >> alternative. Does VeraCrypt work if you intend to use a storage   
   >> device's OPAL hardware encryption?   
   >>   
   >>   
   > There is no mention of that topic here.   
   >   
   > https://en.wikipedia.org/wiki/VeraCrypt   
   >   
   > You will find in the software world, a general distrust of "punting"   
   > to someone elses implementation :-) "What would Linux Torvalds say?" :-)   
   >   
   > https://en.wikipedia.org/wiki/Opal_Storage_Specification   
   >   
   >    "Radboud University researchers indicated in November 2018 that some   
   >     hardware-encrypted SSDs, including some Opal implementations,   
   >     had security vulnerabilities.[5]   
   >   
   >     [5] Meijer, Carlo; van Gastel, Bernard (19–23 May 2019).   
   >         Self-Encrypting Deception: Weaknesses in the Encryption of Solid   
   >         State Drives. 2019 IEEE Symposium on Security and Privacy (SP).   
   >         San Francisco, CA, USA: IEEE. pp. 72–87.   
   >    "   
      
   It's an old matter. There don't seem to be such vulnerabilities in the   
   devices released since then.   
      
   > The advantage of software based methods, is that, as they are cracked,   
   > you can just toss them out of the crypto-suite. There is fast turnaround   
   > for correcting a situation.   
   >   
   > Just as right now, SHA-512 is being popularized, as quantum computer   
   > chill appears on the horizon. Like MD5, the warnings appear ahead of the   
   > actual attack. And while you sit there sipping a coffee, there are   
   > people beavering away on hardened algorithms to withstand quantum   
   > attack.   
      
   For the time being, I'm relying on Linux's built-in encryption. I used it   
   because the hardware encryption is known to cause issues with waking from   
   sleep in Linux.   
      
   --   
   CrudeSausage   
   John 14:6   
   Isaiah 48:16   
   Pop_OS!   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca