well, I would recommend the use of pwgen and Ccrypt as interim measures. one can generate passwords of a very high order strength with one and encrypt files and folders (and even drive images) with the other. Nothing like good old fashioned command line tools to offer security. :) -eric of the Technomage guild. On Jul 12, 2016, at 7:44 PM, Carl Parrish wrote: > Anyone have sources on hardening a pixel? Can you auto encrypt data on Google’s cloud? is it easy to make S3 a default drive? Have we ever done a workshop about using Crouton or chrubuntu on a pixel? Since about 85% of all I do is web work or ssh into a Linux server I really think I can get away with one now as long as 1) no issues access my git remote server / Heroku / Digital Ocean / Engine Yard 2) I can run atom / phpStorm / rubymine in the ubuntu area. If I can verify these things I’m planning on purchasing end of this week. But would love to find a USB-C storage drive to connect to it and perhaps encrypting it for any private data. > >> On Jul 12, 2016, at 6:41 PM, Keith Smith wrote: >> >> >> I read it to be akin to not locking your front door so when the cops come a calling they are legally able to walk in and search. Not so today. The 4th Amendment still protects you from that (you leaving your door unlocked). >> >> They were talking about a computer. Used to be your rights stopped at my nose (computer). >> >> As time passes and the courts allow more violations of the U.S. Constitution we will have no rights. >> >> Last week should have been a wake up call as to how far things have degraded. >> >> >> >> >> On 2016-07-12 00:25, David Schwartz wrote: >>> It would appear that the defendant in this case is basically arguing >>> Heisenburg’s Uncertainty Principle is at play, in that the use of a >>> trojan to identify and spy on his machine may have resulted in the >>> files they found there to have come from unspecified sources, just >>> because the trojan was put there to look around. And the defendant is >>> claiming this has an inherintly indefensible flaw regarding “chain >>> of custody” of the data that was collected from the trojan. >>> It’s kinda like saying that undercover agents in a drug ring cannot >>> be trusted simply because they were able to con the drug ring’s >>> leaders into trusting them, and therefore cannot be trusted by >>> anybody. >>> What they did could actually be accomplished with retargeting pixels / >>> cookies and a little bit of snooping through the defendant’s browser >>> history. It might take a little longer, but the evidence would >>> probably be stronger that way … they’d basically be >>> “triangulating” the computer from multiple sources based on known >>> “salt” cookies (retargeting pixels) that show up passively based >>> on browsing activities. >>> But I also believe the term “online privacy” is an oxymoron, >>> encryption not withstanding. Use the interwebs at your own risk. >>> -David Schwartz >>>> On Jul 10, 2016, at 11:14 PM, Tom Roche wrote: >>>> Apologies to those who've already seen this, but it was news to me: >>>> Last month (Jun 2016), federal district judge Henry Coke Morgan, >>>> Jr[1] ruled that the Fourth Amendment[2] does not protect home >>>> computers. A criminal defendant has no reasonable expectation of >>>> privacy regarding an in-home personal computer, and the federal >>>> government does not need a warrant to hack one.[3] Particularly, "a >>>> computer afforded Fourth Amendment protection in other circumstances >>>> is not protected from Government actors who take advantage of an >>>> easily broken system"[4] to implant malware. The full decision is in >>>> this scanned PDF[5]. >>>> Gotta start hardening, Tom Roche >>>> [1]: https://en.wikipedia.org/wiki/Henry_Coke_Morgan,_Jr [1]. [2]: >>> https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution >>>> [2] [3]: >>> https://www.eff.org/deeplinks/2016/06/federal-court-fourth-amendment-does-not-protect-your-home-computer >>>> [3] [4]: >>> http://arstechnica.com/tech-policy/2016/06/fbis-use-of-tor-exploit-is-like-peering-through-broken-blinds/ >>>> [4] [5]: >>>> https://www.eff.org/files/2016/06/23/matish_suppression_edva.pdf [5] >>>> --------------------------------------------------- PLUG-discuss >>>> mailing list - PLUG-discuss@lists.phxlinux.org To subscribe, >>>> unsubscribe, or to change your mail settings: >>>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss [6] >>> Links: >>> ------ >>> [1] >>> https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZuXg7pb6zmegjIVXNr5ZbBsVvFgvWB-2Fz6lQ7799XmsErU0-2F5zuDODUuGdkR6Ntmh0g-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxfrCsekJ4-2BAStxLkwtwmnU1ZBRj0CkeWrwWWzKHz9ddP8KZtEqqkXpuluubjuAMnblqm47gBsvpib7pgEwbobbeu-2Fp0UywMdZ4NutcG-2B1YrM1NR7Jfuij8qALvzUUSZoaWnLcFSrWln-2FID7JD8-2FOrM8-3D >>> [2] >>> https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZuXg7pb6zmegjIVXNr5ZbBtls8FMDgmv1AHrYEB656DrQ22yL5hgo7z0qBY9JvyvUaWibjDOJU2Wtp6SUFGtgsSN63gL-2BFfGlWfA-2FZbqyqIK_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxZ5KnvAe8313o2yJQSsrni8fylhLivKK4853nozHQRGOX4RIZxW3AFGpcnXdd0S2Z4ehnbzIKGX3qX-2FzOF3Tcto9uJSTnrkr30OEOWMAvb5Lnr4iSExQmkTRmz14HXnrdmUnc2-2F0BnfaOoY7CWMHImM-3D >>> [3] >>> https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZvrcx2vIr5C9zKHC5-2F2Y-2FH3lf-2FCiyR9Vb-2FTNYdT-2FDgZGMcXnIltUnAxdhO9xfyXT3-2FQ0-2FfJ3-2FmYLb9oB1vHPr-2FsjuvP9RZrjxK8L4gaxmg65QlABESJ3YFhLtLc-2B1wb0GQ-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxREzeYsyqkb6uaqoz2UHt0bveOzLUA-2BHGmEq8WRDj-2BfcHNbOj3OIJGKf-2FqqxRrOvK30gPbnrRP3FuPTri5LANQ0I4o-2FjDWVUQIsxF0iPQZocee3D3CQnjaopaBoDi-2Bbc0Dkxg4VfS6uxNPa-2BniU4RSc-3D >>> [4] >>> https://u2206659.ct.sendgrid.net/wf/click?upn=cqRaQJ0PxTF6ZCs9HLFCz3yFMD69v2YHRL5OOOqTOCVOn3BrE5GdklgCLboZGbFdEaS93S3HZ58ZCIdTiGjwQLzBOdEx-2BZQQW8U-2F2oblzM5o2w91R71CN6Pz6TFqn9PBfQmkcmq77-2BuOnz-2FGBkxS6ls2E9mx88vLqNGTwcVMdK8-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxUjAXQrTpe73FdUslcS0WSWpn7fpGrQDP-2Fpr6TwduP3dCZjNL3V2LkL-2FgP9c43OBWZTl3mq7p2ro9WX38VX-2Fz1CGqHKBZRED1tdBSsm6eAGblcRGS8STl7DvcFKsJc8ZJYpOG5ejB8AID5V-2FHHyJ6hU-3D >>> [5] >>> https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZhFguORR1NZFtATSPBpJPe0z95RCf0OK9MDigfu6J9XhN7JJ9F8K4HvDHSdsN-2F1Kcq9QnoMvTBiIggUUmRbiqqc-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxdnJ47tHzYjFxQbDsW6ACMiEHvAJ20Mg91Fk4mlNifHHQmq1zsJPXRi8qRge-2F1i2EiCy2pthAlyHfu2NItEHTTjwRjX2jB0Awl6wJVftjZ8QCk6-2F8aZPWY7LWf-2BuVe-2BPak24l0JArtY6tBOO309Cqw8-3D >>> [6] >>> https://u2206659.ct.sendgrid.net/wf/click?upn=5DvWGaZUY8Sh5aRLWfQTKYiRLVzunonVk948p8WIzMe-2FXlJ9Cta8w8U9xoku9LrUSHNMJbSd3ZEwH-2BqnW2UHlA-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxTi7ekM7kJY96r6UMXMVSWBQQBsJdA9dnj0Oreo-2Bc-2FPZuICjA8tcePwn4I1gJ6ON23RhUT1-2FtF5DbC6VztwbF5svqFT64lLMQFpx3H1idRgKdJaV9u3zy5LBsZnLR6W75i8Wht-2FIo1gywIXhdjbrHUg-3D >>> --------------------------------------------------- >>> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org >>> To subscribe, unsubscribe, or to change your mail settings: >>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss >> >> -- >> Keith Smith >> --------------------------------------------------- >> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org >> To subscribe, unsubscribe, or to change your mail settings: >> http://lists.phxlinux.org/mailman/listinfo/plug-discuss > > --------------------------------------------------- > PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org > To subscribe, unsubscribe, or to change your mail settings: > http://lists.phxlinux.org/mailman/listinfo/plug-discuss