I understand what you're saying. But I stand behind what I said in that someone intelligent and intent on bypassing all of this stuff will do it...
I don't want to seem pushy but this was a political thread from the start. Privacy can be a political issue.
Anti-forensics are any techniques used to defeat forensics. Anyone can come up with them, including you. AES, twofish, and serpent were all...
I have a hard time understanding where you're coming from. The way you talk about the NSA/CIA almost sounds like hero worship to me. The way some...
I should also mention something known as a "dictionary attack" just in case you don't know what a truly random password is. You shouldn't use...
Like I said before, a 14 character, truly random password (~83 bits of entropy) would be sufficient to protect against all but the most...
Assuming 62 possible character and a completely random password, then you would need about 43 characters for AES-256 and about 21/22 characters...
With 62 potential characters, the amount of entropy that a completely random 14 character password would achieve is about 83 bits of entropy,...
I don't think there's any credible speculation that any agency can break a properly implemented AES. There are no known cryptanalytic attacks, and...
I looked back on my comments and thought some of them came across as too harsh, so I removed them. I apologize for that. The only point I was...
I disagree. It shows that he actually cares about the issue, which I would say is a prerequisite to running a service like this. If he didn't care...
I see. Well, I hope you're being forced to use Vista, and it's not a personal choice. Personally, I'm going to skip Vista altogether and see what...
Go to "My Computer". Right click the drive of interest. Uncheck "Allow Indexing Service....". The best way to do it though is to run...
Leaving is the answer when you're surrounded by people unwilling to fight. People who have no conception of history and no understanding of the...
Good choice, SafetyFirst. In the US, where you're guilty until proven innocent, Evidence Eliminator on your computer could indeed be the death...
I've seen a lot of people mentioning an eraser, then looking at the results with WinHex. Why not just use WinHex as your primary eraser? It worked...
Then it's time to move. I'm sad to say it, but the third world is looking ever more appealing. The only thing the US had going for it was the...
Then shut it off or encrypt your operating system or use something other than Windows. That's not a vulnerability in TrueCrypt. That's Windows....
I'm very familiar with the ins and outs of TrueCrypt, and you're not correct. TrueCrypt is one of the most well thought out pieces of software...
I'll just point out again that your network isn't receiving anywhere near the same level of scrutiny as Tor. These types of attacks are going to...
I can barely keep track of the number of theoretical attacks on Tor that have turned to crap in real world situations. I can see three point to be...
The links are still in Keller's post, unless he chooses to delete them. They had to do with sexual preference, and they're totally off-topic. They...
You don't have to be a radical anything to be anti-American government nowadays. It's in vogue. Hell, I live here and I'm not too content. They...
I was just about to erase those links for the same reasons you mentioned. I'll erase them anyway from my post. Feel free to do the same in yours....
For future reference: ** The Truth About Privacy.li ** Privacy.LIE sock puppet traveller/Eggplant pretends to argue with...
Separate names with a comma.