This was not the point. I you don't care about your data on disks which
maybe stolen (for example in notebooks) this is okay for me.
My question was only if there's an existing implementation of this.
10 - 30% performance problems are quite acceptable for
good privacy aren't they?
So if I understood you guys correctly it would be possible by
getting random-data at boottime and use them to build a key
(for example with the algorythms from the kerneli patch), which
will be used to encrypt the swapped out data right?
Would be cool to hear from some others who are interested in
such an implementation of crypted swap, maybe we could start
something like that.
Btw. one of the BSDs uses encrypted swap too iirc, how did they
implement?
so long...
David
-- __ _ | David "netzwurm" Spreen Kiel, Germany / _|___ ___| |__ __ _ _ _ | http://www.netzwurm.cc/ david@spreen.de | _/ _ \/ _ \ '_ \/ _` | '_|| gnupg key (on keyservers): C8B6823A |_| \___/\___/_.__/\__,_|_| | CellPhone: +49 173 3874061- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/