Hacker Newsnew | past | comments | ask | show | jobs | submit | asd344335345's commentslogin


Being knowledgable in internet marketing, the first thing I spotted was that the context of this article is to be an advertisement at hackernews et al.

I am tired of "marketers" posting content here, and I suggest that we should downvote the post and upload the image at an imagehost.


So you're tired of "marketers", yet you think the image has some value, so you want to rip it off the origin website to remove the attribution?

I'm guessing you're also vehemently against copyright laws.

Also, with a new account you're talking about advertisement at hackernews and being tired of marketers posting content here?

I'm just fascinated by how 80% of all complaints about the degrading quality of HN come from new users.


That infographic is taken from seobook.com which in itself might be stolen from somewhere else...


I wasn't paying attention ... then a direct link to seobook.com would be better.

I actually hate it when people don't submit the original source.


Their username looks like random keyboard mashing, so it's likely a regular who doesn't want the comment associated with their usual profile.


Or maybe a username that got (hell) banned.

And while I get the need for anonymity, people really need to grow some balls and stand-up by their beliefs.


After you, bad_user.


My personal website, which gives away my name, my email and links to my detailed LinkedIn account (amongst others), is given in my profile and that link is there for quite some time. I'm not posting under anonymity.


Make it a habit to periodically refresh the username with a login from http://openid.anonymity.com/<name>;


AWESOME!


"In a paper published in 2008 and focused on the then latest version (v5.1a) and its plausible deniability, a team of security researchers led by Bruce Schneier states that Windows Vista, Microsoft Word, Google Desktop, and others store information on unencrypted disks, which might compromise TrueCrypt's plausible deniability. The study suggested the addition of a hidden operating system functionality; this feature was added in TrueCrypt 6.0. When a hidden operating system is running, TrueCrypt also makes local unencrypted filesystems and non-hidden TrueCrypt volumes read-only to prevent data leaks. The security of TrueCrypt's implementation of this feature was not evaluated because the first version of TrueCrypt with this option had only recently been released."


It clearly states that it did not evaluate the security plausible deniability of the 'hidden OS' feature.

This is basically saying that if you mount a hidden partition, you may leak information via things like browser cache that ends up getting saved to unencrypted areas. On the other hand, this says nothing about the case where you have the full drive encrypted and boot a different OS if you mount the hidden partition via the bootloader.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: