--+jhVVhN62yS6hEJ8 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Sep 04, 2003 at 12:11:13PM +0200, Martijn Klingens wrote: > On Thursday 04 September 2003 12:08, Russell Miller wrote: > > On Thu, Sep 04, 2003 at 11:43:12AM +0200, Martin Konold wrote: > > > > The issue at hand was slightly more generic, I was just making an > > > > example. Encryption can defeat root. > > > > > > Sorry, this is incorrect. > > > > Actually, it is not, if the root user does not have the key or passphra= se. >=20 > How do you want to prevent root from sniffing all your keypresses? >=20 > If root doesn't have the key it is always capable to retrieve it in a sys= tem=20 > that's in use. Encryption only helps against systems that are not and can= not=20 > be trojaned. *sigh*. Of course we're talking about relative security here. The only secure system is buried in concrete, somewhere near the core of the earth, is not plugged into anything, does not contain any information, does= not allow anyone to access the information it doesn't contain anyway, and doesn= 't exist. --=20 Daniel Stone http://www.debian.org - http://www.kde.org - http://www.freedesktop.org "Configurability is always the best choice when it's pretty simple to imple= ment" -- Havoc Pennington, gnome-list --+jhVVhN62yS6hEJ8 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iEYEARECAAYFAj9XFVoACgkQcPClnTztfv3S/gCfZY7gNsGCNEWISX4Q4NVuiSzl K8wAoIehGXQ+RpLG69mNtfmHDrA2o1xv =0K6X -----END PGP SIGNATURE----- --+jhVVhN62yS6hEJ8--