Different actions on different passwords?

Steve Searle steve at stevesearle.com
Thu Jan 2 16:32:16 UTC 2014


Around 12:43am on Tuesday, December 31, 2013 (UK time), Patrick O'Callaghan wrote:

> Conclusion: better look for some other way to cover your tracks, and note
> that a forensic investigation can be carried out without having you log in
> at all.

Just to emphasise what Patrick says, if you boot Linux into singe user
mode, you can get root access without needing a password, which would
bypass any setup you had done this way.

You would be better off using disc encryption, and claiming that you
used a long pass phrase which you had written down rather than
remembered, and that you had destroyed the paper it was written on.

Steve

-- 
 
Website:  www.stevesearle.com

 16:28:31 up 14 days, 23:57,  1 user,  load average: 0.01, 0.04, 0.01
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 181 bytes
Desc: not available
URL: <http://lists.fedoraproject.org/pipermail/users/attachments/20140102/a9837769/attachment.sig>


More information about the users mailing list