IRC log for #fredlug on 20111230

02:16.03*** join/#fredlug GGD (~deberle@pool-173-72-204-39.clppva.fios.verizon.net)
02:26.04GGDquestion for anyone here  i think i know the answer but i want to make sure
02:26.41GGDif you have your drive encrypted can someone from outside on your network take a file or anything off the hd?
02:26.57GGDi am thinking no unless they know the password to the machine
02:27.06GGDor account on it
02:28.11jsmithWell, it depends
02:28.30jsmithIf you've unlocked the drive, then yes, it's absolutely possible.
02:29.10jsmithFor example, if you encrypted your entire hard drive, then booted said drive, typed in your encryption password to unlock it (so that it could boot), then left it connected to the network
02:30.03GGDbut if they don't know the username and or password for that machine
02:31.50jsmithWell, who is to say they don't find some other exploit
02:31.51GGDcould they connect and retrieve?
02:32.01jsmithWhat if they find an exploit in apache?
02:32.08GGDgood point
02:32.09jsmithOr a web app running under apache?
02:32.13jsmithOr in SSH itself
02:32.22jsmithOr in some other network-facing application
02:32.46GGDhijack that and get in
02:32.55jsmithIn short, it's pretty naive to think that without a username and password, nobody can get to anything
02:33.34GGDunderstood
02:34.04GGDi was just bouncing some stuff off of the gods of Linux here
02:37.54GGDthank you jsmith
02:41.11jsmithNo problem
02:41.27jsmithwanders off to get away from the laptop for a while
13:14.37*** join/#fredlug jduncan (~jduncan@pool-96-248-11-23.rcmdva.fios.verizon.net)
19:24.15*** join/#fredlug ChanServ (ChanServ@services.)
19:24.15*** mode/#fredlug [+o ChanServ] by bartol.freenode.net

Generated by irclog2html.pl Modified by Tim Riker to work with infobot.