Timeline for When should an IT consultant use full disc encryption?
Current License: CC BY-SA 2.5
8 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Feb 14, 2012 at 15:16 | answer | added | sleske | timeline score: 0 | |
| Dec 6, 2010 at 9:54 | comment | added | Piskvor left the building | @Rory Alsop: Encrypted volumes are IMO a reasonable tradeoff between security and usability - portable (e.g. a 200 MB TC volume on Dropbox), useful for data that's not really secret (but which you wouldn't want to be completely public). In other words, slightly better than no encryption at all - which can be enough for some scenarios. | |
| Dec 4, 2010 at 13:49 | comment | added | Rory Alsop | Unfortunately encrypted volumes are considerably easier to break than full disk encryption, which usually requires something like the Evil Maid attack (schneier.com/blog/archives/2009/10/evil_maid_attac.html) as there is far too often data pertinent to the volume key in memory or temporary space! Check your implementation well if the data on your laptop is highly sensitive! | |
| Sep 30, 2010 at 18:54 | vote | accept | John Fischer | ||
| Sep 29, 2010 at 6:37 | comment | added | GrandmasterB | You can also use something like TrueCrypt to create encrypted volumes. So rather than encrypting the entire drive, it creates 'virtual' drives that you can use to store sensitive information. I do that for my source code & docs on my laptop, should it be stolen. | |
| Sep 29, 2010 at 5:56 | answer | added | orokusaki | timeline score: 2 | |
| Sep 29, 2010 at 5:46 | answer | added | Piskvor left the building | timeline score: 11 | |
| Sep 29, 2010 at 5:26 | history | asked | John Fischer | CC BY-SA 2.5 |