From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Wed, 8 Aug 2001 04:13:36 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Wed, 8 Aug 2001 04:13:26 -0400 Received: from hermine.idb.hist.no ([158.38.50.15]:8457 "HELO hermine.idb.hist.no") by vger.kernel.org with SMTP id ; Wed, 8 Aug 2001 04:13:12 -0400 Message-ID: <3B70F44F.FD7FE6D0@idb.hist.no> Date: Wed, 08 Aug 2001 10:11:59 +0200 From: Helge Hafting X-Mailer: Mozilla 4.76 [en] (X11; U; Linux 2.4.8-pre4 i686) X-Accept-Language: no, en MIME-Version: 1.0 To: David Maynor CC: linux-kernel@vger.kernel.org Subject: Re: encrypted swap In-Reply-To: <5.1.0.14.2.20010807110412.00a8bec0@pop.prism.gatech.edu> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org David Maynor wrote: > > But is the 10% perf hit really gaining you anything, expect to quell your > paranoia. What is next, an encrypted /proc so that possible attackers can't > gain information about running processes? You can compile a kernel without /proc if you want to. Helge Hafting