Private lifestyle: full disk encryption is very recommended option

6:37:00 PM
Private lifestyle: full disk encryption is very recommended option -

as the US authorities decide that they have the right to enter data, following the mandatory life increase: full disk encryption password highly recommended option, in addition to using a firewall and a kind anonymizer encryption of

[

the decision by a US appeals court said that all your hard drives can be searched without a warrant to determine whether you are guilty of a crime, a crime . This means that more than one encryption anonymizer (like Tor or VPN) and a good firewall, full disk encryption is now a must not only for geeks and nerds, but for everyone.

Technically, the appeal court did not rule that no warrant was necessary, as in never unnecessary - but a rule that no warrant was necessary to charge with crime discovered in the data. A search warrant had been issued for a completely different reason, and that the hard disk was being considered, other things were discovered.

This means that the verdict, unencrypted hard drives in people's homes are fair game for any authority. This means it is no longer enough to protect the data that you pass out of the house , rely on due process to protect you against unreasonable searches and seizures and your home is your castle, but also must protect the personal data you store inside of your home against espionage. (. At least in the US, which is mainly affected by this verdict, other countries have other protection levels, both top and bottom) The protection of data in transit and in storage are two types of protection completely different - and require different mechanisms.

While you are protecting the data you to transmit and receive using an encryption anonymizer such as Tor or a VPN (or preferably both), from this moment, you must be using something to protect the data you shop at home -. on your local computer or computers

Encrypt files one at a time can be a tedious process. No, scratch that. He is a tedious process. Therefore, the go-to solution for protecting the whole computer is something called full disk encryption . The term means that the computer will not start, even until you have provided a password to unlock the disk encryption, and everything works as before. Data is written to the encrypted disk, completely transparent to you.

For GNU / Linux users, you are asked if you want to use full disk encryption during installation. If you have the technical knowledge to use GNU / Linux in the first place, I guess you also have the awareness of already use full disk encryption. Otherwise, look utilities LUKS immediately in your favorite manual drive (usually Wikipedia).

For Windows users, there is the high-BitLocker, which is Microsoft and therefore trustworthy by design (sorry Microsoft, but you really really blew your confidence with the behavior of Windows 10 malicious software "upgrade"). Instead, the go-to choice for complete encryption of Windows disk is always something called TrueCrypt, which has been verified to be safe - at least for now - and can be downloaded from Gibson Research. It has the ability to encrypt your entire drive in background while you continue to work, and once it is done, it will require a password to unlock your computer at startup - just like you want. After entering the password, decryption and encryption happens in the background without being noticed, just the way it should be.

The important part here is that authority that not have the password can not access the data on your hard drive. (Unless they throw you in jail indefinitely until you "voluntarily" give up the password, the United States has also been known to do so. For this reason, TrueCrypt also has an option to use a second false password to present something that looks like your computer, but is not.)

the third and fourth major components of privacy is to prevent against intrusion, using a kind of firewall and identity theft, be careful with identification and password information. There are many levels and standards for this and we will consider them in a future article.

Privacy remains your own responsibility.

Previous
Next Post »
0 Komentar