![]() ![]() For those that have repeated access, all it does is make data theft more difficult. The purpose of encrypted volumes is to disallow access to those who might STEAL your laptop or those who might try to access your data if you misplace your laptop, not those that have repeated physical access to it. Let me put this perfectly clearly: if you can boot into a software environment (doesn't even have to be an OS) that accepts input - be it from the network or from physical I/O ports on the machine - you are vulnerable to a keylogger attack. It was never designed nor has anyone in authority ever claimed that this sort of encryption is immune to a keylogger attack simply because that's not the sort of attack that it's designed to thwart. ![]() No, faulting TrueCrypt for being "vulnerable" to a keylogger or hardware attack IS foolish. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |