The original message was received at Mon, 4 Sep 1995 17:35:13 -0400 from unicorn@localhost ----- The following addresses had delivery problems ----- Anonymous <anon-remailer@utopia.hacktic.nl> (unrecoverable error) ----- Transcript of session follows ----- ... while talking to utopia.hacktic.nl.:
RCPT To:<anon-remailer@utopia.hacktic.nl> <<< 550 <anon-remailer@utopia.hacktic.nl>... User unknown 550 Anonymous <anon-remailer@utopia.hacktic.nl>... User unknown 451 cypherpunks@toad.com... reply: read error from toad.com.
----- Original message follows ----- To: Anonymous <anon-remailer@utopia.hacktic.nl> Subject: Re: Emergency File Wipe Algorithim From: Black Unicorn <unicorn@access2.digex.net> Date: Mon, 4 Sep 1995 17:35:07 -0400 (EDT) cc: mail2news@utopia.hacktic.nl, cypherpunks@toad.com In-Reply-To: <199509041725.TAA12314@utopia.hacktic.nl> On Mon, 4 Sep 1995, Anonymous wrote:
Date: Mon, 4 Sep 1995 19:25:07 +0200 From: Anonymous <anon-remailer@utopia.hacktic.nl> To: mail2news@utopia.hacktic.nl, cypherpunks@toad.com Newgroups: alt.security.pgp, alt.politics.org.fbi Subject: Re: Emergency File Wipe Algorithim
When a running computer is seized in some sort of law enforcement raid, what are the chances someone would think to backup the contents of a RAMDISK drive prior to powering it down?
Why would you even ask this question? If the odds are > 0 (which they are) they are too high as the solution is simple. A screensaver which shuts down the system entirely if anything but "}" is pressed. If any key but the secret one is pressed by an excited agent, the ramdisk is gone. If the computer is simply powered down, the ramdisk is gone. I suggest, rather than a ramdisk however, an encrypted partition al la CryptDisk or Secure(Drive? Device?). --- 00B9289C28DC0E55 nemo repente fuit turpissimus - potestas scientiae in usu est E16D5378B81E1C96 quaere verum ad infinitum, loquitur sub rosa - wichtig! *New Key Information* - Finger for key revocation and latest key update.