From: The Drifter <drifter@c2.net>
To: cypherpunks@toad.com
Message Hash: 9b96146336ffa2f8b6b72e44189e83eab7e72bff1ee796e1335290077d8ea068
Message ID: <Pine.SUN.3.94.960827181039.23478A-100000@infinity.c2.net>
Reply To: <199608271401.JAA04116@xanadu.io.com>
UTC Datetime: 1996-08-28 04:21:48 UTC
Raw Date: Wed, 28 Aug 1996 12:21:48 +0800
From: The Drifter <drifter@c2.net>
Date: Wed, 28 Aug 1996 12:21:48 +0800
To: cypherpunks@toad.com
Subject: Re: File System Encryption
In-Reply-To: <199608271401.JAA04116@xanadu.io.com>
Message-ID: <Pine.SUN.3.94.960827181039.23478A-100000@infinity.c2.net>
MIME-Version: 1.0
Content-Type: text/plain
On Tue, 27 Aug 1996, Douglas R. Floyd wrote:
> If you have another 386 or 486 lying around, you could install Linux and
> Ian's encrypted loopback code on a remote box, then NFS or Samba the
> filesystem over. For protection, you could modify the vlock command to
> lock the console (and not unlock it), and disable inetd. Then, unless
> someone has the permissions to access the files through the network, the
> files are inaccessable ;-).
I may have to consider this approach. I'll have to look into Ian's system.
Does it pass muster with the crypto gods? (that's meant as a compliment
guys :)
Drifter
Return to August 1996
Return to “The Drifter <drifter@c2.net>”