Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > Texas > Houston > Coed Discussions - Houston
test
Coed Discussions - Houston Both male and female members can mingle and interact here. Let's keep these discussions on-topic, thought-provoking, and more importantly...entertaining!

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 650
MoneyManMatt 490
Jon Bon 408
Still Looking 399
samcruz 399
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
George Spelvin 313
Starscream66 301
Chung Tran 288
lupegarland 287
nicemusic 285
You&Me 281
sharkman29 263
Top Posters
DallasRain71336
biomed167736
Yssup Rider62874
gman4455017
LexusLover51038
offshoredrilling49489
WTF48272
pyramider46427
bambino45243
The_Waco_Kid39942
CryptKicker37391
Mokoa36499
Chung Tran36100
Still Looking35944
Dr-epg34299

Reply
 
Thread Tools
Old 02-26-2012, 03:48 PM   #16
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by Wakeuр View Post
Still waiting on that shit too...
Don't hold your breath.

http://content.usatoday.com/communit...deadline/index
LexusLover is offline   Quote
Old 02-26-2012, 08:14 PM   #17
Capt. Lincoln F. Stern
Account Disabled
 
Join Date: Sep 9, 2010
Posts: 2,331
Encounters: 20
Default

Quote:
Originally Posted by pyramider View Post
Would the drive be recoverable after the wipe? Or would the info be gone, or scrambled for good?
the drive would be clean. It was first encrypted, then the fail safe would scramble an encrypted drive so even if they got a partial read it would still be garbage.
Capt. Lincoln F. Stern is offline   Quote
Old 02-27-2012, 04:22 AM   #18
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by pyramider View Post
Would the drive be recoverable after the wipe? Or would the info be gone, or scrambled for good?
pyramider, one of the problems on this board from time to time is folks make statements that can mislead others into a false sense of security ... sort of like .... "don't worry about it" ..... without any accountability.

... for your information I just recovered all of the data and files off a formatted drive and I am now in the process of re-organizing it and renaming the files as I do so to put the data and files back into its original condition and organization.
LexusLover is offline   Quote
Old 02-27-2012, 05:53 AM   #19
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by LexusLover View Post
pyramider,

... for your information I just recovered all of the data and files off a formatted drive and I am now in the process of re-organizing it and renaming the files as I do so to put the data and files back into its original condition and organization.
And I would like to add that I have no interest in getting into any testosterone, ass-kissing, white-knight pissing contest .... because I got no dog in the hunt .... and my only concern is that some folks post crap on here they read about from an advertisement or a headline grabbing journalist and post it as FACT .... and some folks buy into it, because they have lots of "reviews" ..... and put themselves at risk by believing it.

It's not about "who wins the discussion on the board" .... it's about your "safety" and the "safety" of those around you. Remember:

"The only people who die of mushroom poisoning are "mushroom experts.""
LexusLover is offline   Quote
Old 02-27-2012, 01:39 PM   #20
txswing99
Gaining Momentum
 
txswing99's Avatar
 
Join Date: Jan 6, 2010
Location: Houston
Posts: 88
Default

Depending on the tools you use, you are provided with a recovery mechanism for an encrypted drive. Generally, this may be a file or some sort of recovery disk which should be stored in a safe and secure place.

Remember, all encryption can be broken with enough time and resources...the idea is to use strong enough encryption to make sure that it is not possible to break in the forceable future with a normal level of resources.

When disposing of...or simply permanently deleting...a drive whether encrypted or not, you should consider using a Secure Erase tool...there are several open source options, but always use one that meets DoD standards. Hardware options exists do this as well.

Hope it helps...

-T
txswing99 is offline   Quote
Old 02-27-2012, 03:48 PM   #21
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by txswing99 View Post
...the idea is to use strong enough encryption to make sure that it is not possible to break in the forceable future with a normal level of resources....
There in lies the principal issue of this discussion ... LE has at its disposal those resources that are above "normal" ... and the bottom line is that if a 13-year-old kid can break into the DOD, FBI, and CIA mainframes ... then it is a "walk in the park" for DHS to pick any lock you throw at it...and LE has their services readily available.
LexusLover is offline   Quote
Old 02-27-2012, 05:36 PM   #22
Capt. Lincoln F. Stern
Account Disabled
 
Join Date: Sep 9, 2010
Posts: 2,331
Encounters: 20
Default

This was posted on TheRegister Laws about encrypting hard drives

Now I am not going to say you won't have hassles but this is a step in the right direction pertaining the 5th amendment.

At its basic definition it implies that no entity can force you to provide evidence of wrong doing against yourself. Be it spoken word, printed word or other type..

I see this gaining momentum, but the danger is that evidence OF crimes can be hidden from the law (child porn, drug cartel financial records etc.....) and if the cops cannot crack into those drives then it will hinder prosecution.

This will be a double edged sword to watch out for
Capt. Lincoln F. Stern is offline   Quote
Old 02-28-2012, 04:39 PM   #23
txswing99
Gaining Momentum
 
txswing99's Avatar
 
Join Date: Jan 6, 2010
Location: Houston
Posts: 88
Default

LexusLover...

Quote:
Originally Posted by LexusLover View Post
There in lies the principal issue of this discussion ... LE has at its disposal those resources that are above "normal" ... and the bottom line is that if a 13-year-old kid can break into the DOD, FBI, and CIA mainframes ... then it is a "walk in the park" for DHS to pick any lock you throw at it...and LE has their services readily available.
In my attempt to be rather precise with my language regarding encryption, I may have suggested that encrypting your private material is not worth the time. It very much is worthwhile.

For example, a brute force attack against a 256-bit key in AES encryption algorithm -- one of the more popular options-- requires 2 to the power of 200 operations; that is, with all the current computing power on earth today would still take far longer than the age of the universe to complete.

While there are other ways to attack encrypted content, the current recommended algorithms are considered very secure at least until we start producing "quantum" computers in approx. 30 to 50 years time. By that time, new stronger encryption algorithms will exist to choose from.

This brings back to my initial point in that software choices are not enough without good procedures to supplement them...over the long term, you should update your encryption periodically to ensure they remain secure.

Good security is about playing the averages...and protecting yourself from the possible threats that you will encounter. LE is not going to spend the same type of resources to investigate that one of the three-letter government agencies would use.

So unless you wind up in the most wanted list, piss off a well-funded gang of European hackers, or impregnate the youngest daughter of a Saudi prince, some common-sense security tools and good practices should go a long way in your hobby life.

my regards...

-T
txswing99 is offline   Quote
Old 02-28-2012, 05:36 PM   #24
Randall Creed
Valued Poster
 
Randall Creed's Avatar
 
Join Date: Dec 22, 2009
Location: The ATL
Posts: 11,486
Encounters: 84
Default

I let a MF'er use my laptop once (foolishly). Man, I tell ya, it was a couple years ago, and I'm STILL uneasy about that shit. And she had it for over a day or so, away from my sight No telling what the fuck she looked up on my computer, or told WHO, and she was fucking around with a potna of mine. Hell, she might've told and showed his ass some shit about me on this computer (this site, for instance). These MF'ers could be monitoring my handle on this MF'er right now, keeping an eye on me and shit.

Fuck that! I'm never loaning my computer out again....ever!!
Randall Creed is offline   Quote
Old 02-28-2012, 07:39 PM   #25
pyramider
El Hombre de la Mancha
 
pyramider's Avatar
 
Join Date: Dec 30, 2009
Location: State of Confusion
Posts: 46,427
Encounters: 10
Default

I was just asking an innocent question ... My computer knowledge is lacking, I thought everything was recoverable.
pyramider is offline   Quote
Old 02-28-2012, 09:22 PM   #26
txswing99
Gaining Momentum
 
txswing99's Avatar
 
Join Date: Jan 6, 2010
Location: Houston
Posts: 88
Default

Pyramider...

Yes, an encrypted drive is recoverable provided you create and store in a safe place a recovery file or disk that the disk encryption software provides.

Quote:
Originally Posted by txswing99 View Post
Depending on the tools you use, you are provided with a recovery mechanism for an encrypted drive. Generally, this may be a file or some sort of recovery disk which should be stored in a safe and secure place.
-T
Hopefully that helps answer your question.

-T
txswing99 is offline   Quote
Old 02-29-2012, 01:56 AM   #27
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by txswing99 View Post
LE is not going to spend the same type of resources to investigate that one of the three-letter government agencies would use.
Herein lies the flaw in all of this gibberish. Local law enforcement daily utilize the resources of Federal and State agencies, and the Feds use the local resources. In fact it may apparently come as a surprize, but local, state, and Federal law enforcement agencies utilize the technical know-how and hardware resources of other traditionally thought to be "non-LE" agencies of the Federal government, eg. NASA, for the enhancement and improvement of data, images, and sound. That was the case before 9-11, but it has increased to an extreme level since. (In fact agencies, e.g. NASA, have "loaner" programs to local LE to utilize equipment (and weapons from DOD) that are on the shelf and readily available for special operations and investigations ... for decades now.)

For some reason folks on here actually believe that "commercially available" and "publicly available" so called "encryption" software can defeat the available resources of the Feds, and to bet one's livelihood, future, and freedom on such folly is to say the least .. foolish. And to "assume" that local LE is not going to utilize the resources of the Feds (implies that the resources ARE available to begin with) is equally fool-hardy and certainly not a "security option" for protecting data.

My suggestion is: If you are going to put your life, future, and freedom on the line with one of these "gee-whiz" IT b.s. encryption ideas, make sure you start a defense fund savings plan along with it. You'll need it.
LexusLover is offline   Quote
Old 03-01-2012, 09:28 AM   #28
bullet0
Lifetime Premium Access
 
bullet0's Avatar
 
Join Date: Dec 31, 2009
Location: Houston
Posts: 307
Encounters: 4
Default

I don't disagree that local LE has all these resources from which to draw, but are they really going to invest that kind of time and effort to get a working girl off the street. Sure it's possible, but not very cost effective. LE can go raid an AMP or two and get plenty of press without spending hundreds or thousands of man hours decrypting one laptop.

Quote:
Originally Posted by LexusLover View Post
Herein lies the flaw in all of this gibberish. Local law enforcement daily utilize the resources of Federal and State agencies, and the Feds use the local resources. In fact it may apparently come as a surprize, but local, state, and Federal law enforcement agencies utilize the technical know-how and hardware resources of other traditionally thought to be "non-LE" agencies of the Federal government, eg. NASA, for the enhancement and improvement of data, images, and sound. That was the case before 9-11, but it has increased to an extreme level since. (In fact agencies, e.g. NASA, have "loaner" programs to local LE to utilize equipment (and weapons from DOD) that are on the shelf and readily available for special operations and investigations ... for decades now.)

For some reason folks on here actually believe that "commercially available" and "publicly available" so called "encryption" software can defeat the available resources of the Feds, and to bet one's livelihood, future, and freedom on such folly is to say the least .. foolish. And to "assume" that local LE is not going to utilize the resources of the Feds (implies that the resources ARE available to begin with) is equally fool-hardy and certainly not a "security option" for protecting data.

My suggestion is: If you are going to put your life, future, and freedom on the line with one of these "gee-whiz" IT b.s. encryption ideas, make sure you start a defense fund savings plan along with it. You'll need it.
bullet0 is offline   Quote
Old 03-01-2012, 09:52 AM   #29
boardman
Making Pussy Great Again
 
boardman's Avatar
 
Join Date: Jan 4, 2010
Location: In your closet, in your head...
Posts: 16,093
Encounters: 26
Default

Animal control only has nets and tranquilizer guns...
boardman is online now   Quote
Old 03-01-2012, 10:52 PM   #30
txswing99
Gaining Momentum
 
txswing99's Avatar
 
Join Date: Jan 6, 2010
Location: Houston
Posts: 88
Default

Quote:
Originally Posted by LexusLover View Post
My suggestion is: If you are going to put your life, future, and freedom on the line with one of these "gee-whiz" IT b.s. encryption ideas, make sure you start a defense fund savings plan along with it. You'll need it.
It seems that your basic advice is one should basically do nothing...'cause they can get you!...no matter what!

It's a bit like saying that to prevent pregnancy we should only have sex with good girls from the local church and then keep walking to the next town...'cause those new-fangled condoms are uncomfortable and can ultimately be defeated with a well-placed bobby pin...and her daddy will get you anyways!

Well, that argument is gibberish! Folks should use all the available protection.

Further, this thread started with a real-world story describing how using some of these protection options could not be defeated by LE, or an overzealous divorce lawyer. While I certainly can appreciate that you might be a little skeptical of that story...I'm definitely skeptical that your "do nothing 'cause they will get you anyways" strategy is anything like a good idea.

-T
txswing99 is offline   Quote
Reply



AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved