<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: The Week in Links: October 14	</title>
	<atom:link href="https://titsandsass.com/the-week-in-links-october-14-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://titsandsass.com/the-week-in-links-october-14-2/</link>
	<description>By and about sex workers</description>
	<lastBuildDate>Thu, 27 Oct 2011 09:50:57 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>
		By: Insomniac		</title>
		<link>https://titsandsass.com/the-week-in-links-october-14-2/#comment-1927</link>

		<dc:creator><![CDATA[Insomniac]]></dc:creator>
		<pubDate>Thu, 27 Oct 2011 09:50:57 +0000</pubDate>
		<guid isPermaLink="false">https://titsandsass.com/?p=6043#comment-1927</guid>

					<description><![CDATA[Blackberries.  Seriously.  Yeah, they&#039;re not the hot sexy phone, what they are is the most secure phone you&#039;re not going to drop over $1000, need 2 lines, and probably won&#039;t be able to find anyone to actually sell you one...

In the configuration, you can set the number of attempts at the password before it scrubs the phone&#039;s memory.  It&#039;s an actual scrub too.  Not NSA level data scrubbing, but still good enough to destroy all but the most determined and advanced data recovery programs.  I seem to remember that the data is stored in an encrypted format on them as well, but I&#039;d have to look it up first, so don&#039;t go on that, but do bear in mind that BBs are cleared for containing classified information -- for whatever that&#039;s worth.  If my memory is correct and it is stored in an encrypted format, I cannot imagine a way that device can crack it.  Even if they know the functions involved, unless possibly the function is seeded with something like the IMEI/EIN/PIN number of the device...Hrm.  This is highly interesting.  I&#039;ll look more deeply into this.

Just something on the side, for keeping electronic records, if you&#039;ve not heard of/use TrueCrypt, fix that immediately.  Google&#039;ll set you right in where to get it from and how to use it, but with a strong password and the use of keyfiles (preferably keyfiles kept in removable media that is highly inconspicuous) no one is getting into that encrypted volume without you telling them how to or devoting a few years on a few super computers to it as well.
is
Suppose I have a massive collection of pictures of my awe-inspiring +5 penis of might and amazement (name&#039;s Zeke).  Well, I might not want these to get leaked to the world as seeing such images may cause the entire male portion of our race to commit mass suicide from the futility of knowing that such a member exists and there is no hope to compete with it.  In my infinite grace, I&#039;ve got to take care to protect men from such an ignoble doom.  To achieve this end, I can take TrueCrypt and make two encrypted volumes with it.
The first one, I&#039;ll name something like &quot;personal info&quot; or &quot;financial info&quot;, and I&#039;ll keep in that volume absolutely nothing but personal info like an excel document with my SSN, driver&#039;s license number, bank account numbers, credit card numbers -- stuff that any sane person would want to keep protected from possible thieves.  I&#039;ll keep it in my documents folder.
The second one, I&#039;m going to be sneaky with.  I&#039;m going to name it something like ztpoj.dll (zeke the mighty penis of justice -- needs to be something easy to remember).  I&#039;ll then put this file in one of my random program folders that has other .dll files in it (again, some place I make a point of remembering, but NEVER writing down or recording).  This is the folder I put all of the images I must keep from the world in (12 megapixels can&#039;t even contain it all).  Now unless someone knows exactly what dll files come with that program, if I don&#039;t have it opened with TC, it&#039;ll look like any random dll file (it might be better to use an extension like .dat for larger files, but the process is basically the same, and avoid the main windows folders, use some program you&#039;ve installed b/c windows dlls are decently well known by techs), and for someone looking through my computer it would take one hell of a snoop to even think to check such out.

Here&#039;s why you made two encrypted volumes, hid one and left the other one in the open.  Suppose that for some reason an officer of the law decides he needs to know what&#039;s on my computer.  Even has all of the proper warrants and such.  Well, they see that truecrypt program and want to know what I&#039;ve got hidden with it.  Alrighty, sure thing boss.  No problemo.  Then I just open the personal info one, allow them to look at my financial information and stuff like social security number and credit card number.  I then suppress a smile as they gravely and sagely nod approval that such things should be kept under tight security, knowing full well that I am saving them from themselves and the inevitable suicide what comes of witnessing images of my member.  I&#039;ve demonstrated a legit use and left them none the wiser...]]></description>
			<content:encoded><![CDATA[<p>Blackberries.  Seriously.  Yeah, they&#8217;re not the hot sexy phone, what they are is the most secure phone you&#8217;re not going to drop over $1000, need 2 lines, and probably won&#8217;t be able to find anyone to actually sell you one&#8230;</p>
<p>In the configuration, you can set the number of attempts at the password before it scrubs the phone&#8217;s memory.  It&#8217;s an actual scrub too.  Not NSA level data scrubbing, but still good enough to destroy all but the most determined and advanced data recovery programs.  I seem to remember that the data is stored in an encrypted format on them as well, but I&#8217;d have to look it up first, so don&#8217;t go on that, but do bear in mind that BBs are cleared for containing classified information &#8212; for whatever that&#8217;s worth.  If my memory is correct and it is stored in an encrypted format, I cannot imagine a way that device can crack it.  Even if they know the functions involved, unless possibly the function is seeded with something like the IMEI/EIN/PIN number of the device&#8230;Hrm.  This is highly interesting.  I&#8217;ll look more deeply into this.</p>
<p>Just something on the side, for keeping electronic records, if you&#8217;ve not heard of/use TrueCrypt, fix that immediately.  Google&#8217;ll set you right in where to get it from and how to use it, but with a strong password and the use of keyfiles (preferably keyfiles kept in removable media that is highly inconspicuous) no one is getting into that encrypted volume without you telling them how to or devoting a few years on a few super computers to it as well.<br />
is<br />
Suppose I have a massive collection of pictures of my awe-inspiring +5 penis of might and amazement (name&#8217;s Zeke).  Well, I might not want these to get leaked to the world as seeing such images may cause the entire male portion of our race to commit mass suicide from the futility of knowing that such a member exists and there is no hope to compete with it.  In my infinite grace, I&#8217;ve got to take care to protect men from such an ignoble doom.  To achieve this end, I can take TrueCrypt and make two encrypted volumes with it.<br />
The first one, I&#8217;ll name something like &#8220;personal info&#8221; or &#8220;financial info&#8221;, and I&#8217;ll keep in that volume absolutely nothing but personal info like an excel document with my SSN, driver&#8217;s license number, bank account numbers, credit card numbers &#8212; stuff that any sane person would want to keep protected from possible thieves.  I&#8217;ll keep it in my documents folder.<br />
The second one, I&#8217;m going to be sneaky with.  I&#8217;m going to name it something like ztpoj.dll (zeke the mighty penis of justice &#8212; needs to be something easy to remember).  I&#8217;ll then put this file in one of my random program folders that has other .dll files in it (again, some place I make a point of remembering, but NEVER writing down or recording).  This is the folder I put all of the images I must keep from the world in (12 megapixels can&#8217;t even contain it all).  Now unless someone knows exactly what dll files come with that program, if I don&#8217;t have it opened with TC, it&#8217;ll look like any random dll file (it might be better to use an extension like .dat for larger files, but the process is basically the same, and avoid the main windows folders, use some program you&#8217;ve installed b/c windows dlls are decently well known by techs), and for someone looking through my computer it would take one hell of a snoop to even think to check such out.</p>
<p>Here&#8217;s why you made two encrypted volumes, hid one and left the other one in the open.  Suppose that for some reason an officer of the law decides he needs to know what&#8217;s on my computer.  Even has all of the proper warrants and such.  Well, they see that truecrypt program and want to know what I&#8217;ve got hidden with it.  Alrighty, sure thing boss.  No problemo.  Then I just open the personal info one, allow them to look at my financial information and stuff like social security number and credit card number.  I then suppress a smile as they gravely and sagely nod approval that such things should be kept under tight security, knowing full well that I am saving them from themselves and the inevitable suicide what comes of witnessing images of my member.  I&#8217;ve demonstrated a legit use and left them none the wiser&#8230;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Foreign Fuzoku &#124; 六本木		</title>
		<link>https://titsandsass.com/the-week-in-links-october-14-2/#comment-1876</link>

		<dc:creator><![CDATA[Foreign Fuzoku &#124; 六本木]]></dc:creator>
		<pubDate>Wed, 19 Oct 2011 17:35:13 +0000</pubDate>
		<guid isPermaLink="false">https://titsandsass.com/?p=6043#comment-1876</guid>

					<description><![CDATA[[...] Flirtations: Labor, Migration and Sex Trafficking in Tokyo by Rhacel Salazar Parreñas, (hat-tip to Tits and Sass for introducing me to it) which seems to cover some of the topics I touched on, namely the effect [...]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Flirtations: Labor, Migration and Sex Trafficking in Tokyo by Rhacel Salazar Parreñas, (hat-tip to Tits and Sass for introducing me to it) which seems to cover some of the topics I touched on, namely the effect [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Maggie McNeill		</title>
		<link>https://titsandsass.com/the-week-in-links-october-14-2/#comment-1861</link>

		<dc:creator><![CDATA[Maggie McNeill]]></dc:creator>
		<pubDate>Sat, 15 Oct 2011 14:08:39 +0000</pubDate>
		<guid isPermaLink="false">https://titsandsass.com/?p=6043#comment-1861</guid>

					<description><![CDATA[Password-protecting your cell phone may not do any good; Michigan cops have devices that can download the entire contents of a phone, bypassing the need for passwords: http://www.clickondetroit.com/news/27564088/detail.html

I don&#039;t know for a fact that California has these devices &lt;em&gt;yet&lt;/em&gt;, but it&#039;s only a matter of time until they do.  I wouldn&#039;t keep any client or other confidential data in a phone, period.]]></description>
			<content:encoded><![CDATA[<p>Password-protecting your cell phone may not do any good; Michigan cops have devices that can download the entire contents of a phone, bypassing the need for passwords: <a href="http://www.clickondetroit.com/news/27564088/detail.html" rel="nofollow ugc">http://www.clickondetroit.com/news/27564088/detail.html</a></p>
<p>I don&#8217;t know for a fact that California has these devices <em>yet</em>, but it&#8217;s only a matter of time until they do.  I wouldn&#8217;t keep any client or other confidential data in a phone, period.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
