MN: Encryption Software Evidence of Criminal Intent

Status
Not open for further replies.
Encryption Advice

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

I would recommend using asymetric encryption. Symetric does not provide
sender authentication, non-repudiation. In addition symetric encryption
suffers from an inability to distribute the shared key in a secure manner.

Also, the hashing algorithms SHA and AES have recently been smashed by the
Chinese. Use better.

Will Albenzi

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.0 (Build 2001) - not licensed for commercial use: www.pgp.com

iQEVAwUBQpUPyVXfDRWNpSD+AQiuvAf9HLOODHbzcHjZaP+cqlqe6cLHTE7u9Dks
EOyu4XxhZ34t3X1FX1tO9PsAA4b41fn4kJKFRME5d83sAvxSJVj4T7teBWlumrYa
nkdU5Ncr565mHLm13xhWcSWE3EH6MbzYnYJkVeL6bWz7UJuEs3MOQS+NBexJjl48
A/7T1tBE5lsfXz+/wiPAf+cHG3ln79Q3FtK5/+hA7xHjM7WBFMAu7lLF7x9QSu0s
BoV4EGrkV+zg26J0eDqnAEZVaeL2BJqM5LPkYaxPnh9iEJ2046G1KaDAo2bfnJfE
dx3/QB6yoHbFwje7WW15mFAKWqhfZsL7A3ikmEnJSCGOV7m0y5uvMw==
=d43q
-----END PGP SIGNATURE-----
 
If one uses an External Hard Drive, does this add a level of security?

Say for instance one uses a External Hard Drive , and each night and this is placed in a vault to protect sensitive files. Let us say for banking, patient accounts, or on-line Stock Trading.

Are there any 'ghosts' left on the computer the EHD was used on?

I might want to download a Copy of 1984 , UC , EFAD ...and the Constitution before they start banning books, historical documents and such.
 
sm,
It Depends.

What programs are you using to access the data on the external hard drive?
 
I don't know - yet. I'm thinking tho'.

Honest, I am an older returning student taking IT. I am not to that part of my education yet. I transferred to another College having all my Core stuff ( readin' , writin' and 'rithmetic) behind me. So far been doing all the fun Micro Apps, Voice Data, Cabling, Elec for PC , IT Essentials I...etc. Getting ready to start more of the Cisco stuff.

Before I started the IT bit, I was wonderin' how one could protect their privacy..been 'concerned' about stuff like this, and gummit meddlin since I was a wee pup.

Having been hit hard by ID theft - mail stolen with my SSN on School documents, bank records, CC bills...

Well...you see, this IT stuff I can see being a useful tool. * ahem* Me being me and all...if I ever finish these studies I have an idea what I want to do. :) Hint: It ain't gov't meddlin' ;)

Actually looking for another job that will allow me to attend School , and learn some valuble ...err...training. :uhoh:

Just Wonderin' :D
 
I know I am beginning to sound like a broken record, but why not just charge him for the actual crime instead of adding made-up crimes as enhancers?

Just like the previous thread that used a burgler as an example, why not just charge him of burglery, or attempted burglery, instead of "Possession of burglery equipment" (ie, a screwdriver)?
 
Status
Not open for further replies.
Back
Top