02:16.03 | *** join/#fredlug GGD (~deberle@pool-173-72-204-39.clppva.fios.verizon.net) |
02:26.04 | GGD | question for anyone here i think i know the answer but i want to make sure |
02:26.41 | GGD | if you have your drive encrypted can someone from outside on your network take a file or anything off the hd? |
02:26.57 | GGD | i am thinking no unless they know the password to the machine |
02:27.06 | GGD | or account on it |
02:28.11 | jsmith | Well, it depends |
02:28.30 | jsmith | If you've unlocked the drive, then yes, it's absolutely possible. |
02:29.10 | jsmith | For example, if you encrypted your entire hard drive, then booted said drive, typed in your encryption password to unlock it (so that it could boot), then left it connected to the network |
02:30.03 | GGD | but if they don't know the username and or password for that machine |
02:31.50 | jsmith | Well, who is to say they don't find some other exploit |
02:31.51 | GGD | could they connect and retrieve? |
02:32.01 | jsmith | What if they find an exploit in apache? |
02:32.08 | GGD | good point |
02:32.09 | jsmith | Or a web app running under apache? |
02:32.13 | jsmith | Or in SSH itself |
02:32.22 | jsmith | Or in some other network-facing application |
02:32.46 | GGD | hijack that and get in |
02:32.55 | jsmith | In short, it's pretty naive to think that without a username and password, nobody can get to anything |
02:33.34 | GGD | understood |
02:34.04 | GGD | i was just bouncing some stuff off of the gods of Linux here |
02:37.54 | GGD | thank you jsmith |
02:41.11 | jsmith | No problem |
02:41.27 | jsmith | wanders off to get away from the laptop for a while |
13:14.37 | *** join/#fredlug jduncan (~jduncan@pool-96-248-11-23.rcmdva.fios.verizon.net) |
19:24.15 | *** join/#fredlug ChanServ (ChanServ@services.) |
19:24.15 | *** mode/#fredlug [+o ChanServ] by bartol.freenode.net |