Thursday, June 3, 2010

The futility of data analysis

Just saw this on one of my favorite sites:


How to Encrypt and Hide Your Entire Operating System from Prying Eyes:


Over the years, we've written about loads of different ways to hide and encrypt your private data from others, but if you're really serious about protecting your data, you can actually hide your entire operating system. Here's exactly how to do it.

To accomplish this task, we'll be using TrueCrypt, our favorite free and open-source disk encryption software that runs on all platforms, supports hidden volumes, and can even encrypt your entire hard drive."

In short, these are easy to follow instructions on getting a fully hidden OS on your system, protected by industrial grade encryption. And it includes a fully functional"decoy OS", so when somebody puts a (legal) gun to your head, you can give them a second password, and have a totally believable alternative to your real installation.


This has been possible for quite a while now, but seeing it explained in easy-to-follow steps on a mainstream site is another tipping point passed.



Game, set, match.


Can somebody explain to me why we still have laptop inspections in airports?  Does anybody believe that any TSA agent is going to be able to discover this system?

No comments: