<div dir="ltr">To make it simpler (as you should understand already) - if someone can touch or control the hardware, they've got your data.<div><br></div><div>James</div></div><div class="gmail_extra"><br><div class="gmail_quote">On 27 March 2015 at 15:22, Peter Adkins <span dir="ltr"><<a href="mailto:peter.adkins@kernelpicnic.net" target="_blank">peter.adkins@kernelpicnic.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>Slightly OT here, but just keep this in mind for implementation if you go down this route. There are also a number of other attacks of a similar nature, that are quite well documented, floating around the Internet.</div><div><br></div><div><a href="http://blackkettle.org/blog/2015/02/19/youve-got-to-trust-your-vm-host/" target="_blank">http://blackkettle.org/blog/2015/02/19/youve-got-to-trust-your-vm-host/</a><br></div></div><div class="gmail_extra"><div><div class="h5"><br><div class="gmail_quote">On Thu, Mar 26, 2015 at 6:08 PM, Matt Palmer <span dir="ltr"><<a href="mailto:mpalmer@hezmatt.org" target="_blank">mpalmer@hezmatt.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div>On Fri, Mar 27, 2015 at 11:00:30AM +1000, David Beveridge wrote:<br>
> On Fri, Mar 27, 2015 at 10:51 AM, Justin Clacherty <<a href="mailto:justin@redfish.com.au" target="_blank">justin@redfish.com.au</a>><br>
> wrote:<br>
><br>
> > On 27/03/2015 10:32 AM, David Beveridge wrote:<br>
> ><br>
> > Does anyone know if the amendment to require encryption of Meta-data got<br>
> > up in the end?<br>
> > It is only required for offshore backups or what?<br>
> ><br>
> ><br>
> > It did. It's required for all data, not just backups offshore or otherwise.<br>
> ><br>
> > From the Bill:<br>
> ><br>
> > 187BA Ensuring the confidentiality of information<br>
> > A service provider must protect the confidentiality of information<br>
> > that, or information in a document that, the service provider must<br>
> > keep, or cause to be kept, under section 187A by:<br>
> > (a) encrypting the information; and<br>
> > (b) protecting the information from unauthorised interference or<br>
> > unauthorised access.<br>
> ><br>
> > I don't understand how this is practical.<br>
><br>
> Does anyone know how to have an SQL database encrypt radius logs.<br>
> or have sendmail/postfix write logs in encrypted format?<br>
<br>
</div></div>LUKS.<br>
<span><font color="#888888"><br>
- Matt<br>
</font></span><div><div><br>
_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
</div></div></blockquote></div><br><br clear="all"><div><br></div></div></div><span class="HOEnZb"><font color="#888888">-- <br><div>Regards,<br>Peter Adkins<br></div>
</font></span></div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br></div>