Berkeley CSUA MOTD:Entry 36077
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2005/2/6-7 [Computer/HW/Laptop, Computer/SW/Security] UID:36077 Activity:very high
2/6     Our parent company is considering forbidding us from taking laptops
        off the premises due to possible src code loss.  Considering that
        many of us work from home the majority of the time, this does not
        sit well.  We need to come up with a proposal for keeping the
        src (or entire disk) on an encyrpted drive.  I used PGP desktop
        a while back but never did any disk intensive activity (eg compilation)
        on it.  Has anyone been subjected to similar measures and have any
        suggestions?  Thanks.
        \_ Yeah, plenty of companies are hiring. Start looking for another
           job now.
           \_ I love my job.  Not interested in a new one. -op
              \_ Do you think this is the last PHB decision they will make?
                 You love it now, but this is just a harbinger of things
                 to come. I am sorry I cannot be more positive. There has
                 got to be some way of encrypting things for you but I
                 don't know what it is.
                 \_ Maybe not, CHKP is an agent of the Mossad, so I wouldn't
                    put anything past them, but, regardless, i need to wait
                    a few more years for the remainder of my options to vest.
                    -op
        \_ Write up a reasoned explanation of why this won't help. Particularly
           in a technical field (development), it's always near trivial to find
           ways around this unless they completely isolate your work network
           from the internet.  (i.e. you can't go to websites, check popmail,
           etc)  If there are any such "holes" that those evil, evil employees
           could just copy the code out through, encrypting it locally won't
           help.
           \_ The issue is not that they don't want employees stealing the
              src, the issue is that laptops are prime targets for theft and
              if someone were to get their laptop stolen, release of the
              src code would be disasterous.  Of course there are plenty
              of ways to get around it.  -op
              \_  Out of curiosity, does anyone know how often data from
                  stolen laptops ends up getting into the wrong hands?
                  I would have guessed that most laptops get stolen
                  by crackheads who sell them to the local pawn shop for a
                  hundred dollars, who then erases the harddrive and sells
                  it for two hundred to some random moron.  At what point in
                  this chain does data get sent to some competing software
                  company?  Are there people out there making a living
                  cruising the silicon valley pawn shops for sellable data on
                  stolen hard drives?
        \_ magnetic tape, flashdrive/CF/SD/etc, laptop HD in a USB/FW case ...
           iPod/etc ...
           \_ Again I'm not looking for ways to take src code home.  I'm
              looking for a reasonable solution for securing the data on
              the laptop to mollify their concerns and to prevent me
              from having to jump through such hoops.  I still have VPN
              access to CVS from my desktop at home and if it were to come to
              it would just ditch the laptop.  -op
              \_ it was meant as examples to give your company to prove
                 how fucking stupid they are.
              \_ Uhm, if you have VPN access to the company what makes
                 the company think that someone can't just steal your
                 computer at home and get the source code there? I'm sure
                 that you encrypt your data, but that's not a guarentee
                 that someone else who works under similar conditions will.
                 Anyway, what's so important about the source code? MS had
                 its source code for Winblows leaked, it's not like someone
                 is going to go and develop a competing product anytime soon.
                 And if your software is that valuable, people can just
                 reverse it through brute-force decompilation and analysis.
        \_ It looks like PGP Corporate deployed using smart cards or tokens
           (e.g. RSA SecurID doodads) is probably what you want.  I just
           glanced at the marketing drivel on the website so you'll need to
           read further to be sure, but this looks like a reasonable place to
           start:
           http://www.pgp.com/products/desktop/disk
           -dans
           \_ We had very good success with Safeguard Easy (both boot sector
              protection and on-the-fly disk crypto.)  If you're feeling
              adventurous, you can play with MS EFS on top, but your PKI
              admins had better know what they're doing.  -John
        \_ Most responses don't really understand the problem. Working in
           an environment where much of our software is classified as a
           munition, I do. It is about accountability more than actual
           prevention of theft. They *know* you can steal the source and
           if they were concerned about that they'd do what the DoD does
           and make you leave it at work. They are concerned about the
           laptop being stolen. Whether or not it is easy to obtain the
           source by hacking into the system over VPN is irrelevant. In
           our particular case, it is just disallowed. Period. You can
           take the executables, but not the source. I, too, am interested
           in a good solution but I think none exists. However, I do not
           understand why the desktop is allowed. That is just as much of
           a no-no.
        \_ I would just take the source code home and be done with it.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2013/8/16-10/28 [Computer/HW/Laptop] UID:54728 Activity:nil
8/16    I just left my employer. They didn't ask to get their HW back.
        Is is common for employers to contact me a few months/years later
        and ask for their HW back?
        \_ Is it an iPhone 9 prototype? :-)
           \_ as a matter of fact, it is just a 2 year old laptop
              and they don't seem to keep track of inventor
	...
2013/7/8-8/23 [Computer/HW/Laptop] UID:54706 Activity:nil
7/8     Suppose I just stopped going to work and stopped communicating
        with them. How many days will it take before they stop sending me
        paycheck (and maybe even try to get back the laptop they gave me)?
        \_ They'll probably try to call your emergency contact first to see if
           you're hit a tree or something.
           you've hit a tree or something.
	...
2011/12/21-2012/2/6 [Computer/HW/Laptop, Computer/SW/Editors/Emacs] UID:54269 Activity:nil
12/21   In Emacs, how do I make it so that it will resize its screen
        when the maximum resolution of my monitor changes? When I
        use my laptop, my emacs is too big (and I can't resize it
        because the bottom-right corner is not accessible).
        \_ Which OS?  Can't you drag the top border (not a corner) to resize
           the height to be smaller?
	...
2011/5/9-7/13 [Computer/Companies/Apple, Computer/SW/OS/OsX] UID:54106 Activity:nil
5/4     Any thoughts about apple switching to ARM for all machines?
        \_ Could only have happened if the Mac App Store had been a wild, wild
           success, and they were willing to give up Steam. Games/dual-booting
           is strategically valuable to not driving people away from macs.
           A new ARM iOS based device, or opening the Apple TV to iOS apps
           (same thing, really) would be much more likely than sabotaging their
	...
2011/3/12-4/20 [Consumer/CellPhone, Computer/HW/Laptop] UID:54057 Activity:nil
3/12    I am curious what others think of tablets like iPad. They don't seem
        useful to me, but I use my computer for more than web browsing,
        Facebook, and Twitter. Why would I buy one instead of a laptop?
        They seem like a disabled laptop to me, but at a higher price.
        \_ You are most likely a coder.  iPad is not for coders.  They are
           what you get your non-technical friends.  Or musicians.  Look at
	...
2010/8/23-9/7 [Computer/SW/OS/Windows] UID:53932 Activity:low
9/21    are you guys really all using win7 in some way now?
        \_ Yes.  In my company, we have upgraded all our machines for
           development, QA and other office use (HR, Finance, Receptions, etc.)
           from WinXP to Win7 a few months ago.  Our products now primarily
           support Win7/Win2008 and secondarily support WinXP/Win2003.
           \_ Any weird gotchas support-wise?
	...
2010/5/17-26 [Computer/SW/OS/OsX] UID:53835 Activity:nil
5/13    I am getting a new Macbook Pro. Should I get a glossy or matte screen?
        I always had matte in the past. I use my laptop just about everywhere
        and glare is a concern. Should I stick with matte? I noticed
        glossy is the default now.
        \_ It is weird, but I have the glossy screen that goes to the edge of
           the monitor for my 13" PB and it somehow seems bigger than the one
	...
2010/4/5-15 [Computer/HW/Laptop, Computer/SW/OS/OsX] UID:53770 Activity:nil
4/4     My macbook is dying. After three and a half years, I want to retire it,
        and get a new one, but I live in constant fear* that Apple will pull a fast
        one on me and update them as soon as I do. Anyone know anything about an
        impending Apple laptop refresh?
        * = hyperbole
        \_ http://buyersguide.macrumors.com
	...
2010/1/22-30 [Computer/HW/Laptop, Computer/SW/OS/OsX] UID:53655 Activity:high
1/22    looking to buy a new development laptop
        needs ssdrive, >6 hr possible batt life, and runs linux reasonably
        Anyone have a recommendation? Thx.
        \_ thinkpad t23 w ssdrive and battery inplace of drive bay
        \_ Ever wondered what RICHARD STALLMAN uses for a laptop?  Well,
           wonder no more!
	...
2009/10/24-11/3 [Computer/HW/Laptop] UID:53466 Activity:kinda low
10/24   How well do you see color? I got 8, how about you?
        http://www.xrite.com/custom_page.aspx?PageID=77
        \_ 7
           \_ what monitor did you use?
              \_ LCD on thinkpad x32, under not so great lighting conditions.
        \_ I scored 101, which seems impossible. Then again, I didn't
	...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (1235 bytes)
www.pgp.com/products/desktop/disk -> www.pgp.com/products/desktop/disk/
PGP Corporate Disk extends PGP Universal's network-based, user-transparen t, automatic email solution to also protect information stored on local desktop and laptop disks. PGP Corporate Disk is optimized for the centralized IT needs of organizat ions, complementing the network security provided by PGP Universal. PGP Corporate Disk combines PGP Disk and PGP Admin to provide a desktop disk security solution that is centrally configured, deployed, and managed. Centralized preconfiguration lets administrators set and lock policy set tings and create a customized installer. Centralized policy management a llows changes and updates to be automatically distributed via LDAP direc tories. PGP Corporate Disk also features automatic administrator-control led PGP disk generation and deployment. PGP Corporate Disk is the only mass-storage security solution that provid es a breadth of authentication options and scales to meet customers' nee ds. PGP Corporate Disks can be secured using a unique passphrase, one or more PGP keys, or smart cards/tokens. Plus, PGP Corporate Disk allows t he use of an Additional Decryption Key (ADK) to ensure that confidential information is available when neededa policy requirement in many compa nies.