From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from aserp1040.oracle.com ([141.146.126.69]:33230 "EHLO aserp1040.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754279AbdHUNhO (ORCPT ); Mon, 21 Aug 2017 09:37:14 -0400 From: Anand Jain Subject: Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption To: Eric Biggers , "Theodore Y . Ts'o" Cc: linux-fscrypt@vger.kernel.org, linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, Jaegeuk Kim , Richard Weinberger , Michael Halcrow , Eric Biggers References: <20170818194730.61575-1-ebiggers3@gmail.com> Message-ID: <9dcef6c6-a758-ea57-0d51-55f33e365931@oracle.com> Date: Mon, 21 Aug 2017 21:44:11 +0800 MIME-Version: 1.0 In-Reply-To: <20170818194730.61575-1-ebiggers3@gmail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-fsdevel-owner@vger.kernel.org List-ID: > +fscrypt is not guaranteed to protect confidentiality or authenticity > +if an attacker is able to manipulate the filesystem offline prior to > +an authorized user later accessing the filesystem. How does fscrypt / Android protect against Evil Maid attack. ? Thanks, Anand