Securing the end-points
-----BEGIN PGP SIGNED MESSAGE----- Greetings! I was wondering if in addition to all the work and discussion regarding crypto which generally centres around the transmission path information takes traveling from end-point to end-point, there is any work being done to secure the end-points themselves (I.e. files on your PC etc.) In my view the end-points present the most vulnerability in the overall message path from person to person. It is at these points that the message/information exists as cleartext even if for a short period of time. While of course it is possible to PGP encode your files is this a practical way to go about securing your system? I am aware or RSA secure but is that all there is out there? Thanks in advance Glen McBride Bay Networks ASIA-PAC customer service Australia Views are my own and do not represent those of my employer ===== CURRENT PGP KEY FOLLOWS ===== - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQERAzDFDk4AAAEIAJvkPKWMS8TR5eNNQZw5FjUg8roSe/wFdw3d8vCEfb2lX3G+ qBAQKuTSUAhO8marZvNWF9VPuyqkOGEOrwzdont8jSHAdF9dguh1sP56eGXzyn8n mDN1Fw8vQiNrttvCEYUjvLEML8tFlLc7QlQRkAMEGrkH29D4ck3wOkJLEaSZrTcO RIZAzOBVVvrJORVKsREnGG4IrItJCiREw7Gp/LXIHMSEBCdu2+uaNc9nHQxKcYZc yx9UiiZ0XP6TzzUtkD00ZDtO8OdZCAhXdj0zbCUKVrzuY37EgnFVFQ7SlZZAQn/U Jx26k0eZvZhXjhSVd3QyElbJYNFVLrdyU+h+Gt0AIwQAAAABtCpHbGVuIE1jQnJp ZGU8R0xFTl9NQ0JSSURFQGJheW5ldHdvcmtzLmNvbT4= =N/lg - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBMNS1vy63clPofhrdAQHn1wgAjHV2vKXIEY4qZ/Rm2rq4hnJsUJDt+zd5 BbYo/BZBruwX+gqylYlbOemkPvZ7ktAMdu9jUFfaJQ7Cb3jT4kgfp2dqqle6yaq1 0nxU9m7BMiVnSqevtK5Fy+thR/yVZWdHi1LFMy48yp8FCaqvMkEruscOsG0ydUNM lyf3OCNGdN7LQcxQkRE9UzKPwEpacDD/afU5W5aZhhchkpAH9t/kqKzvgXxia1VF 4hfOEcCMN21JO6QGqdnHASVNoIdV44O6BlUPhv5omAqofgU58tnbJ9G3/24zjecM QhxTMGBv+aDB1DtQ+k9wDJTdPBLwhqyWUZWImN3RPVnQb1Ec1CVM8A== =yLIB -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- On 18 Dec 1995, Glen McBride wrote:
Greetings! I was wondering if in addition to all the work and discussion regarding crypto which generally centres around the transmission path information takes traveling from end-point to end-point, there is any work being done to secure the end-points themselves (I.e. files on your PC etc.)
In my view the end-points present the most vulnerability in the overall message path from person to person. It is at these points that the message/information exists as cleartext even if for a short period of time. While of course it is possible to PGP encode your files is this a practical way to go about securing your system? I am aware or RSA secure but is that all there is out there?
Thanks in advance
Glen McBride Bay Networks ASIA-PAC customer service Australia
The best way to secure the endpoints of communication is to use a sector level encryption TSR like SecureDrive. In a program like this, when a file is opened for reading or writing, the TSR automatically en/decrypts the data before it is processed by the calling application. Aside from a slightly slower disk access rate, a program like this is not inconvenient to use at all. SecureDrive is available at ftp://ftp.csua.berkeley.edu/pub/cypherpunks/ filesystems/secdr13c.zip. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMNXTIrZc+sv5siulAQHCEQQAoe+4m0mbN9vjQwsO3cDbC/f/HQv5wlv5 TMRIsyYZ7JdYbFqoBIJyHCvKrVu+D41MsOJBZYpdOvd6pn9sQZA8jf2MaSFFnV7O MgeupyvG3/gvHYFCobFWYfpDzjHHJt57CxxVHb8q3q+pJs2uF0fDTtWUxvBjk4ym cJgsC3sc1jo= =x6Ca -----END PGP SIGNATURE----- finger markm@voicenet.com for Public Key http://www.voicenet.com/~markm/ Key-ID: 0xF9B22BA5 Fingerprint: bd24d08e3cbb53472054fa56002258d5 -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GAT d- s:- a? C++++ U+++>$ P+++ L++(+++) E--- W++(--) N+++ o- K w--- O- M- V-- PS+++>$ PE-(++) Y++ PGP+(++) t-@ 5? X++ R-- tv+ b+++ DI+ D++ G+++ e! h* r! y? ------END GEEK CODE BLOCK------
participants (2)
-
GLEN_MCBRIDE@BayNetworks.com -
Mark M.