This article can also be found in the Premium Editorial Download "Information Security magazine: Security researchers on biometrics, insider threats, encryption and virtualization."
Download it now to read this article plus other related content.
Here's an important encryption algorithm for you to memorize:
PD – (p0l1cy & enc) = br3ach
Just kidding; the translated version may be less silly, but no less accurate: Portable devices without clear policy and encryption enabled may well lead to a data breach.
A June 2008 study conducted by the Ponemon Institute on behalf of Dell found that more than 12,000 laptops are lost by users each week as they pass through airports.
What to do? While more corporations are deploying commercial encryption solutions, it's not general practice. If you want to do something for yourself and perhaps your small business or circle of executives, consider TrueCrypt (
Open source Adeona keeps tabs on your wandering laptop.
You've taken the steps to encrypt your data with TrueCrypt, now take the time to make use of Adeona (http://adeona. cs.washington.edu/), the open source "LoJack" for your laptop. This unique project's approach to system tracking also manages to preserve your privacy.
Only you, or someone you choose to act on your behalf, can track your laptop with Adeona. Mac users will love the fact that Adeona can make use of the built-in iSight camera and capture pictures of your laptop's thief in action.
The Adeona client uses OpenDHT to store location updates sent from your laptop and regularly monitors its location, including current IP addresses and local network topology. In order to maintain privacy during this process, Adeona utilizes cryptographic methodology to ensure that you (or your agent) are the only ones that can use the Adeona system to reveal where the device has been.
This was first published in November 2008