mån 2014-03-31 klockan 08:05 +0000 skrev tarsnap: > ... > The (part of the) keyfile would then only reside in RAM during the time > that tarsnap is running (and does it really need to stay there all the > time?), making it more difficult for hackers to catch it. Couldn't you just as easily solve that part yourself by at the backup moment copy your tarsnap key to a tmpfs mount? To be on the safe side it probably wouldn't hurt to disable swap, or go with an encrypted swap. // Andreas
Attachment:
signature.asc
Description: This is a digitally signed message part