Emergency File Wipe Algorithim

Black Unicorn unicorn at access.digex.net
Mon Sep 4 14:36:54 PDT 1995


On Mon, 4 Sep 1995, Anonymous wrote:

> Date: Mon, 4 Sep 1995 19:25:07 +0200
> From: Anonymous <anon-remailer at utopia.hacktic.nl>
> To: mail2news at utopia.hacktic.nl, cypherpunks at toad.com
> Newgroups: alt.security.pgp, alt.politics.org.fbi
> Subject: Re: Emergency File Wipe Algorithim
> 
> When a running computer is seized in some sort of law enforcement
> raid, what are the chances someone would think to backup the
> contents of a RAMDISK drive prior to powering it down?
> 
> 

Why would you even ask this question?  If the odds are > 0 (which they 
are) they are too high as the solution is simple.

A screensaver which shuts down the system entirely if anything but "}" is 
pressed.

If any key but the secret one is pressed by an excited agent, the ramdisk 
is gone.  If the computer is simply powered down, the ramdisk is gone.

I suggest, rather than a ramdisk however, an encrypted partition al la 
CryptDisk or Secure(Drive? Device?).


---
00B9289C28DC0E55 nemo repente fuit turpissimus - potestas scientiae in usu est
E16D5378B81E1C96 quaere verum ad infinitum, loquitur sub rosa    -    wichtig!
*New Key Information*    -    Finger for key revocation and latest key update.







More information about the cypherpunks-legacy mailing list