You know the saying, "you're as young as you feel." Well, that's as young as I feel. ;)
Well, if we're talking about tin-foil, my arguments certainly don't qualify for that label. Everything I said is about as grounded in reality as...
Here's my suggestion. Wait a week for another response. If no one chimes in with something that works, then maybe it's safe to assume that...
\Device\Harddisk1\Partition0 This implies that the entire hard drive is encrypted, as someone else previously mentioned. Definitely DO NOT...
This is why I think the NSA seems extremely confident, in response to what chronomatic posted. If I put myself in their position, I know I have...
Well, that's more probable than back dooring all those other programs, but I still doubt it very much. If I'm running a version of TrueCrypt...
A DNS problem seemed improbable when someone tried the IP address, and even that didn't work. Besides, if it were DNS, you'd think someone would...
Backdoor to what? Truecrypt, PGP, FreeOTFE, DriveCrypt, WinRAR, 7-zip, etc. All of these programs are back doored? Or is it to the algorithms?...
Unbreakable crypto is extremely hard. Crypto that will slow down a 3 letter agency for a long time, not so hard. At least that's my opinion. While...
I think it will take a hit in the event of another major terrorist attack in the future. It could be anywhere from a "red flag", as you previously...
IP address should work though, right? Maybe those who want it could try access by typing in the IP.
I've never used the same one twice. In fact, I've been known to just throw some away if I've posted too much with it. I just use whatever...
The way I see it, law enforcement is simply going to have to accept that they can no longer access the data on hard drives when the person used...
No they can't. Not even my ISP can track a single username that I've used where I've wanted to stay anonymous. The admins at Wilders don't even...
If you have everything configured properly, they won't see either. They'll see a connection to the first/entry node. Tor uses three nodes and...
Hey, I'll test it out some more, but I think you've probably worked the kinks out. And it's a totally optional character. No one has to use it....
Ha ha. Keep in mind that I'm half asleep, but I think you were right when you said you needed to remove the duplicate checking from the null...
Me confused. Tried this again: (s1|s2|s3|s4|s5|s6|s7|^|@| |\0|\0|\0){5:1} But I got 154,440 this time, which is really no major...
I initially sent this message as a PM to tateu, but I figured there's no problem posting it. I was thinking that if you're ever able to get a...
Only in the extremely unlikely event that a cryptanalytic attack on TrueCrypt was found that is actually quicker to exploit than a strong password.
I initially thought that removing the duplicate checking from the null would be the best way to go, but there is also some benefit from being able...
Also, by doing this: (s1|s2|s3|s4|s5|s6|s7|^|@| ){5:1} (s1|s2|s3|s4|s5|s6|s7|^|@| ){4:1} (s1|s2|s3|s4|s5|s6|s7|^|@| ){3:1}...
Okay, I'm trying to gauge the program by trying to solve a problem we've been working on, namely piotreg's problem. By assuming that piotreg...
I'm impressed by how quickly you did that. I had a response which I subsequently deleted because I realized I made a mistake. I'm currently...
Dunno. With my version of Winhex, I've noticed some wacky things too, but I never investigated. It wasn't a priority for me. Although, I will...
Separate names with a comma.