Emergency File Wipe Algorithim
Black Unicorn
unicorn at access.digex.net
Mon Sep 4 14:36:54 PDT 1995
On Mon, 4 Sep 1995, Anonymous wrote:
> Date: Mon, 4 Sep 1995 19:25:07 +0200
> From: Anonymous <anon-remailer at utopia.hacktic.nl>
> To: mail2news at utopia.hacktic.nl, cypherpunks at toad.com
> Newgroups: alt.security.pgp, alt.politics.org.fbi
> Subject: Re: Emergency File Wipe Algorithim
>
> When a running computer is seized in some sort of law enforcement
> raid, what are the chances someone would think to backup the
> contents of a RAMDISK drive prior to powering it down?
>
>
Why would you even ask this question? If the odds are > 0 (which they
are) they are too high as the solution is simple.
A screensaver which shuts down the system entirely if anything but "}" is
pressed.
If any key but the secret one is pressed by an excited agent, the ramdisk
is gone. If the computer is simply powered down, the ramdisk is gone.
I suggest, rather than a ramdisk however, an encrypted partition al la
CryptDisk or Secure(Drive? Device?).
---
00B9289C28DC0E55 nemo repente fuit turpissimus - potestas scientiae in usu est
E16D5378B81E1C96 quaere verum ad infinitum, loquitur sub rosa - wichtig!
*New Key Information* - Finger for key revocation and latest key update.
More information about the cypherpunks-legacy
mailing list