Active Topics



Thread Tools
pichlo's Avatar
Posts: 5,358 | Thanked: 16,418 times | Joined on Sep 2012 @ UK
Originally Posted by MoritzJT View Post
I cannot accept a device management policy on my phone that has remote wipe and whatnot capability that also affects user data. It is unacceptable as a tradeoff to gain corporate interest for SFOS in my opinion.
Then good bye corporate uptake of SFOS.

I really wish people at least tried to see things from the other side before they blurted out their holy truths. Imagine you were the company owner. Would you risk your company's trade secrets by allowing your employees to use insecure devices, without encryption and remote management including wipe? If you did and they left the phone on the train, you would have only yourself to blame.

Different hardware for work and pleasure is the obvious answer.
In particle accelerators atoms are indeed not only touching each others. But banging together in a massive explosive orgasm.
-- nieldk in a TMO post

The Following 4 Users Say Thank You to pichlo For This Useful Post:
Posts: 105 | Thanked: 396 times | Joined on Dec 2014 @ Poland

The Following 6 Users Say Thank You to atlochowski For This Useful Post:
Posts: 1,469 | Thanked: 6,990 times | Joined on Apr 2010 @ Czech Republic
Originally Posted by velox View Post
  • "Encrypt user data" (Accepting this will encrypt all user data stored on the device. This is an irreversible change and you will need to enter a lock code on all future boots in order to access your data.<br><br>If you accept the device will reboot automatically and you will be prompted for your lock code before encrypting your data. This may take as long as an hour and your device will not be usable again until the encryption has completed.)
I wonder how this is implemented - it basically means they will probably do in place conversion from unencrypted volume to an encrypted one as they can hardly leave enough place free to make it possible to create a new ecrypted volume of same size as the current one and copy the current data to that. Apparently there is a tool to do in-place LUKS conversion, so maybe they are going to use that. Or they could setup LUKS by default and just set the encryption key once requested (& possibly reencrypt the data with it).
modRana: a flexible GPS navigation system
Mieru: a flexible manga and comic book reader
Universal Components - a solution for native looking yet component set independent QML appliactions (QtQuick Controls 2 & Silica supported as backends)

The Following 3 Users Say Thank You to MartinK For This Useful Post:
Posts: 92 | Thanked: 384 times | Joined on Jul 2013 @ Katowice, PL
It would be easy with filesystem-level encryption, like encfs or ecryptfs. Still I'd prefer blockdev-level.

The Following User Says Thank You to briest For This Useful Post:
Posts: 5 | Thanked: 11 times | Joined on Oct 2017 @ Finland
This thread is dead for no reason..

The Following 3 Users Say Thank You to Korkkiruuvi For This Useful Post:

Thread Tools

Forum Jump

All times are GMT. The time now is 06:14.