On Thu, 2011-10-13 at 17:05 +0200, Andreas Bader wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 13.10.2011 14:02, Karsten N. wrote: > > Am 13.10.2011 08:39, schrieb William Wrightman: > >> Is moving to Linux one solution? > > > > I agree with Adrew, there is no 100% solution. > > > > But you can do as much as possible to increase your security. > > > > Moving to Linux (or OpenBSD ;-) ) is one step. > > > > Full disk encryption is possible. For Debian or Ubuntu you can enable > > full disk encryption at installation time. It does not need any > > additional software. (I am not sure about other distributions.) > > > > For WIN you may use Truecrypt or Diskcryptor or other software for full > > disk encryption. Since version 6.1 Truecrypt can use hardware tokens > > together with pass-phrases. > > > > Live-CDs are a possible solution too. > > > > You may apply many steps and it will be better than doing nothing > > because you can not get 100% security. > > > > Best regards > > Karsten N. > > _______________________________________________ > > tor-talk mailing list > > tor-talk@xxxxxxxxxxxxxxxxxxxx > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > > > > Hello, > I read lots of articles and analysis about the ?Bundestrojaner? (thatÂs > how the german keylogger is called here). It seems like you donÂt have > to worry. It is more a virus construction kit than a virus. In > accordance with the Chaos Computer Club theyÂll need about 10 experts > working 5 months just to develop and adapt one keylogger. It makes also > sense to install one Linux Distribution. I use Ubuntu 11.04 on my second > notebook, fully encrypted (can be choosen while the installation, just > choose the ?alternate disc? to download). It is much more faster, more > secure and just better then Win7. > If you have to use Windows 7, try the Truecrypt Preeboot encryption. It > is open source software and pretty authentic. With Truecrypt, you can > also encrypt external drives. The most important part of the whole > encryption thing is the password, choose it as long as possible. The > only possibility to crack such an encryption is bruteforce, and using a > long password will destroy this chance. > So far. > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.11 (GNU/Linux) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ > > iQEcBAEBAgAGBQJOlv42AAoJEL7Y0QyTZ3lX5kMH/3kC0mNS+tReib2FnJgtmcpM > MB0VsVwgpQMegr3CCaYKmSUfTYmeo6jzeo7YgTe2QQQKhyX1ZTbcISQ9CXexDSf6 > ddIruIXVIaUEZ1qNm5TmyCqmGS12zQ8oYmWa0R4tVrgVg8vtExa/gySjq1AobBZT > 9g2o02T8nBGCmppsc35DzJlheyl30W2bMl31AyrXWlJ6pHPoroEQ2uSiPe80Ea4T > 14++EWByU2AXzWGVHm0kTqSQrwNseOj4O56/zXQMpbssIcilhIDOwB5FyIYREj/v > 2HieResVuP35H87nmo+jIi/abLSm94YPbvRiwDM5Empvh1CfbzvgGwKvMbL3LdU= > =Q2Gt > -----END PGP SIGNATURE----- Though always a good idea, encryption doesn't protect against trojans. It may have limited effectiveness against incompetent attackers physically tampering with your system.
Attachment:
signature.asc
Description: This is a digitally signed message part
_______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk