From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: <775b8d19050219122073cac012@mail.gmail.com> Date: Sun, 20 Feb 2005 07:20:10 +1100 From: Bruce Ellis To: David Leimbach , Fans of the OS Plan 9 from Bell Labs <9fans@cse.psu.edu> Subject: Re: [9fans] writing code In-Reply-To: <3e1162e60502190115563fbb0d@mail.gmail.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit References: <3e1162e60502181149dac62fe@mail.gmail.com> <20050218195950.GS77074@cassie.foobarbaz.net> <3e1162e60502190115563fbb0d@mail.gmail.com> Cc: Topicbox-Message-UUID: 4edb3cfe-eace-11e9-9e20-41e7f4b1d025 oz-inferno has an encrypted filesystem (based on flashfs). the configuration and other local private stuff is intended to live on a usb-flash thingy (along with the executable and boot crap). i hope to release some of this stuff when i get some time off doing real work. brucee On Sat, 19 Feb 2005 01:15:59 -0800, David Leimbach wrote: > On Fri, 18 Feb 2005 11:59:50 -0800, Christopher Nielsen > wrote: > > On Fri, Feb 18, 2005 at 11:49:43AM -0800, David Leimbach wrote: > > > > To prevent this you either need to prevent someone from booting > > > > (ie. bios password and hope they dont go through the trouble > > > > of yanking the drive or resetting the bios) or you need to > > > > protect the disk (after all thats probably what they want to > > > > get at after they log in, not network access or the gui). > > > > Something like: > > > > > > > > http://phk.freebsd.dk/pubs/bsdcon-03.gbde.paper.pdf > > > > > > > > would address this nicely. For those who don't want to chase > > > > down the paper, it's an encrypted disk format used by the > > > > FreeBSD group. > > > > > > > > > > Isn't it actually a block-level encryption rather than a filesystem > > > implementation? > > > > yes. that's exactly what it is. how is that not useful in this > > case? > > > > > > Why would you assume that I'd think it's not useful? >