Re: [Fed-Talk] OS X 10.4.9 Things - Backdoor to Encrypted DriveImageFiles
Re: [Fed-Talk] OS X 10.4.9 Things - Backdoor to Encrypted DriveImageFiles
- Subject: Re: [Fed-Talk] OS X 10.4.9 Things - Backdoor to Encrypted DriveImageFiles
- From: "Michael Pike" <email@hidden>
- Date: Wed, 14 Mar 2007 14:06:05 -0600
I would much prefer a cut and dried answer from Apple stating, "There are no back doors in the encrypted disk image files." :)
On 3/14/07,
Billy Lenox <email@hidden> wrote:
I think it might have been this list on what the Update did:
On 3/14/07 3:49 PM, "Michael Pike" <
email@hidden> wrote:
Yes I did... which is why I am so concerned.... it prompted for the password immediately, but then did the "check" after having it being entered... and has NOT done it again, so I cannot reproduce the situation with this image to see if anything change that I can monitor.
mike
On 3/14/07, Rich Trouton <email@hidden> wrote:
Had you already provided your password to unlock the disk image when
the message popped up? It sounds like the disk image mounter was
running a checksum verification check before allowing it to mount.
Thanks,
Rich
On Mar 14, 2007, at 3:39 PM, Michael Pike wrote:
> I upgraded my MacBook Pro to 10.4.9 last night... aside from Remote
> Desktop crashing quite a bit (where it didn't before) as well as
> iChat crashing... something strange happened that I have a concern
> with...
>
> I typically carry around FireLite drives with me to store my
> sensitive data on... I use encrypted drive image files to do this
> so that the information is unusable should the drive get lost or
> stolen... I do this instead of using FileVault as FileVault slows
> down the performance of Parallels or other large file access
> systems considerably....
>
> My concern: This morning while mounting my secure drive image
> 10.4.9 popped up a window and stated, "Verifying Drive Image"...
> this took about 5-6 seconds....
>
> What did 10.4.9 just do? With the way George W is being, was Apple
> pressured into some type of key backdoor? Did 10.4.9 install a
> secondary key or something that lets people into my image that I
> did not authorize?
>
> Out of all my years with OS X, I have NEVER seen this message pop
> up on an encrypted R/W drive image, and now all the sudden it pops
> up... what exactly did it do?
>
> This concerns me...
> mike
>
>
> --
> Michael Pike
> iChat/AIM:
email@hidden
> Jabber / GoogleTalk: email@hidden
<mailto:email@hidden>
> Skype: michael.pike
> _______________________________________________
> Do not post admin requests to the list. They will be ignored.
> Fed-talk mailing list (
email@hidden
<http://40mail.nih.gov>
>
> This email sent to email@hidden
---
Rich Trouton (Contractor)
LAN Support
email@hidden
-----------------------------------------------------------
National Human Genome Research Institute
National Institutes of Health — Bethesda, MD
Office number:
(240) 643-7816
NHGRI LAN Support number:
(301) 402-7408
The best way to get in touch with me is through email.
_______________________________________________
Do not post admin requests to the list. They will be ignored.
email@hidden
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (
--
Michael Pike
iChat/AIM:
email@hiddenJabber / GoogleTalk:
email@hiddenSkype:
michael.pike
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden