In Other BSDs for 2015/09/12

This was a quieter-than-normal week, probably because of the North American holiday at the start of it, but I found enough articles by the end.

 

2 Replies to “In Other BSDs for 2015/09/12”

  1. Could in theory HAMMER also be used to defeat Cryptlocker attacks in the same way described for ZFS? Mirror stream to a different machine is one way I imagine and the slave pseudo file systems are read only.

  2. It would work – not because of streaming, because the streaming action would happily copy the now-encrypted data out to the read-only slave, but because of historical snapshotting. You’d be able to move to a snapshot in time before the encryption happened and pull out the data there.

Comments are closed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)

Mentions

  • Justin Sherrill
  • Anonymous