On Thursday, October 18, 2012, V G wrote: > On Thu, Oct 18, 2012 at 7:56 AM, Isaac Marino Bavaresco < > isaacbavaresco@yahoo.com.br 'isaacbavaresco@yahoo.com.br');>> wrote: > >> Em 18/10/2012 08:37, V G escreveu: >> > If Google + NSA + whatever turned every machine they had against me, I >> > wonder how long it would take them to crack the Serpent-Twofish-AES >> > encrypted data on my hard drive. Note, I mean from a mathematical >> > standpoint - that is, not including torture/Guantanamo, etc... >> >> Which software do you use? > > > Linux on dm-crypt+LUKS on one drive for experimentation, TrueCrypt on the > other set of drives for serious work. I would like to switch to > dm-crypt+LUKS completely for many reasons, just need to make sure that it > supports hardware encryption/decryption and has good multi > threading performance before I make the switch. > I'm not *actually* worried about the government/google trying to get into my data. I only use serpent-twofish-aes cascaded block ciphers because TrueCrypt offers it and it's just as easy to set up. The kind of data I'm protecting (for example, medical data) can be more than sufficiently protected with the aes block cipher alone. With LUKS/dm-crypt, you can cascade as many times as you want by layering/mapping virtual devices over and over again. I just didn't bother cascading with LUKS/dm-crypt because that requires setting each layer up as opposed to TrueCrypt taking care of it for you automatically. The dm* (dm-crypt, dm-raid, mdadm, lvm) system for Linux is absolutely beautiful though. They layer very nicely and I've never once had any issues with them. --=20 http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .