Re: [IP] One Internet provider's view of FBI's CALEA wiretap push
t 10:09 AM 4/23/04 -0400, Tyler Durden wrote:
"I wonder how quickly one could incinerate a memory card in the field with high success rate? Destroy the data and the passphrases don't help."
Well, what if there were 3 passwords:
1) One for Fake data, for amatuers (very few of the MwG will actually be smart enough to look beyond this...that's why they have guns) 2)One for real data...this is what you're hiding 3) One for plausible real data, BUT when this one's used, it also destroys the real data as it opens the plausible real data.
The first thing cops do is make backups of the harddrives. So you can't destroy the "real data". You would need a tamper-"proof" card (ie trusted security region) to implement this. None of the commercial memory gizmos, from USB dongles to stamp-sized memory cards, do this. None of the smart cards are user programmable and none include secure wipe, AFAIK. Do PDA apps? How do they store data between battery changes? Is it enough to hold a tiny memory card for a minute over a lighter? Merely snapping the card into pieces? Does one need to make a scene with fireworks? (I'm remembering that spammer who tried to eat a small memory card.)
participants (1)
-
Major Variola (ret)