I take your point about the encryption dilemma(did I spell that correctly). I think the Jury is out on that particular issue though... Personally I think we are in a perpetual game of cat and mouse with those who make it their business to know everything about everyone.. On 02/06/2014 18:52, In Harms Way wrote: > Well, Shaun, that's known, but what is wanted is still an answer to > the question which encryption program to use (we understand that > truecrypt cam under pressure from TPTB and played the canary song. > > Also in 3 here it is compulsory to have > 3) have full disk encryption by default. > > Question is how, in a reliable way.? > > Shaun O'Connor wrote, On 02/06/2014 10:24: >> Tor a computer to be truly air gapped the following conditions must >> be satisfied. >> 1) the computer must at no time have been connected to the internet. >> 2) be devoid of any means of wirelessly connecting to the internet. >> 3) have full disk encryption by default. >> 4) be devoid of any monitoring capability( no microphone , no built >> in camera. >> remember blue tooth is vulnerable so it should not be present either.). >> However , since the air gap methodology is now widely known computer >> manufacturers are likely to be put under pressure to"net test" their >> products prior to dispatch. >> in other words, learn to build a computer from scratch or find >> someone who can.. ideally someone you can trust implicitly. >> >> I think that satisfies the question as to what an airgappe computer is.. >> >> On 02/06/2014 06:45, In Harms Way wrote: >>> Please, Ryan Carboni, kindly explain, what you mean by "Airgap >>> encryption". >>> >>> Airgap as method to keep certain data on computers safe by keeping >>> them off the net *is broken;* >>> <http://www.slate.com/blogs/future_tense/2013/12/03/researchers_michael_hanspach_michael_goetz_prove_malware_can_jump_air_gap.html> >>> >>> the "airgap browser" is not (yet?) available for consumers and an >>> encryption algorithm called "airgap" is not existing to my knowledge. >>> >>> Did I miss something? >>> >>> Ryan Carboni wrote, On 31/05/2014 11:17: >>>> Airgap encryption. >>>> >>>> >>>> On Fri, May 30, 2014 at 11:13 PM, In Harms Way >>>> <11414150173@xxxxxxxxxx <mailto:11414150173@xxxxxxxxxx>> wrote: >>>> >>>> >>>> Now serious: Which open-source programme for >>>> container-encryption of all files and disks the professionals >>>> like medical doctors, lawyers, priests et. al. still can use to >>>> fulfil their legal obligation to store patient or client data >>>> 100% secure ???? >>>> >>>> To my understanding PGP encryption with UCE (only user has the >>>> private key - private key not grabbed by any webmail etc.) for >>>> e-mails (e.g. via Thunderbird and enigmail) is still not broken >>>> (if user disabled hibernation on his/her machine to avert >>>> pass-phrase stealing from the hibernation dump). >>>> >>>> But which other truecrypt-like open-source programme still >>>> stands strong for file/disk-encryption.? >>>> >>>> Any suggestions? >>>> >>>> Shaun O'Connor wrote, On 30/05/2014 12:06: >>>>> got to agree on that point and tails 1.0 was only released >>>>> recently too!! >>>>> On 30/05/2014 00:14, tpb-crypto@xxxxxxxxxxx >>>>> <mailto:tpb-crypto@xxxxxxxxxxx> wrote: >>>>>>> Message du 29/05/14 19:49 >>>>>>> De : "Jean-Philippe Décarie-Mathieu" >>>>>>> >>>>>>> Oh, I'm nowhere near giving up. I'm aware of the alternatives; it's >>>>>>> just >>>>>>> that this whole TC story is obscure as hell. Still no words from the >>>>>>> developer(s)... It's gotta suck for Tails and other projects that >>>>>>> have >>>>>>> integrated TC also. >>>>>>> >>>>>> Other projects will not be affected. That's the nature of open >>>>>> source, you close a door, a window opens. >>>>>> >>>>>> Those interested will keep truecrypt alive, it just takes interest. >>>>>> >>>>>> . >>>>>> >>>>> >>>>> -- >>>>> https://www.resetthenet.org/ *On June 5 2014, this email >>>>> addrfess will NOT be accepting any mails....are you in?* >>>> >>>> >>>> -- >>>> We have nothing to hide, but something to protect: >>>> LIBERTY, PRIVACY & FREEDOM >>>> - and the people, whose human rights these are. >>>> >>>> >>> >>> >>> -- >>> We have nothing to hide, but something to protect: >>> LIBERTY, PRIVACY & FREEDOM >>> - and the people, whose human rights these are. >> >> -- >> https://www.resetthenet.org/ *On June 5 2014, this email addrfess >> will NOT be accepting any mails....are you in?* > > > -- > We have nothing to hide, but something to protect: > LIBERTY, PRIVACY & FREEDOM > - and the people, whose human rights these are. -- https://www.resetthenet.org/ *On June 5 2014, this email addrfess will NOT be accepting any mails....are you in?*