In Other BSDs for 2015/09/12

This was a quieter-than-normal week, probably because of the North American holiday at the start of it, but I found enough articles by the end.

 

2 Replies to “In Other BSDs for 2015/09/12”

  1. Could in theory HAMMER also be used to defeat Cryptlocker attacks in the same way described for ZFS? Mirror stream to a different machine is one way I imagine and the slave pseudo file systems are read only.

  2. It would work – not because of streaming, because the streaming action would happily copy the now-encrypted data out to the read-only slave, but because of historical snapshotting. You’d be able to move to a snapshot in time before the encryption happened and pull out the data there.

Comments are closed.