Different actions on different passwords?

Robert P. J. Day rpjday at crashcourse.ca
Thu Jan 2 20:30:05 UTC 2014


On Thu, 2 Jan 2014, Joe Zeff wrote:

> On 01/02/2014 08:32 AM, Steve Searle wrote:
> > You would be better off using disc encryption, and claiming that you
> > used a long pass phrase which you had written down rather than
> > remembered, and that you had destroyed the paper it was written on.
>
> Just to toss an idea out here.  Imagine an accountant who has all of
> his work data on a big partition mounted at (let's say) /data.  If
> he wanted to hide a "second set of books," he could close his
> accounting program, unmount the partition and restart the program,
> so that /data now pointed to someplace on his main partition.  When
> he's done, he exits and remounts the partition.  The data's there,
> you can get to it if you know what to do, but I can't help but
> wonder how likely anybody, such as a forensic accountant, that was
> examining your system would even think of such a thing.  Any
> thoughts?

  1) friend of mine many years ago used to do that -- while working
     full-time for a company, he created a separate filesystem on the
     company server for his own stuff that he would mount manually.

  2) any forensic analyst that would be fooled by something like that
     would be a total incompetent.

rday

-- 

========================================================================
Robert P. J. Day                                 Ottawa, Ontario, CANADA
                        http://crashcourse.ca

Twitter:                                       http://twitter.com/rpjday
LinkedIn:                               http://ca.linkedin.com/in/rpjday
========================================================================



More information about the users mailing list