This thread http://www.frequentflyer.com.au/com...-your-legal-rights-re-15538-3.html#post207945
got me thinking about what people do to protect there data.
If anybody is wondering the lengths i have been known to go to i have my hard disk encrypted, you enter a password to boot to the normal 'public' or 'decoy' OS and you enter a different password to boot to a completely hidden OS.
Volumes can be protected by 3 cascading encryption algorithms, eg AES, Twofish, and Serpent. The chances of all 3 algorithms being compromised is i would say rather slim.
Generally however i think its ok just to use AES 256bit key for most jobs
E
got me thinking about what people do to protect there data.
If anybody is wondering the lengths i have been known to go to i have my hard disk encrypted, you enter a password to boot to the normal 'public' or 'decoy' OS and you enter a different password to boot to a completely hidden OS.
Volumes can be protected by 3 cascading encryption algorithms, eg AES, Twofish, and Serpent. The chances of all 3 algorithms being compromised is i would say rather slim.
Generally however i think its ok just to use AES 256bit key for most jobs

E