What the NSA is patenting

Douglas R. Floyd dfloyd at io.com
Sun Sep 8 17:33:21 PDT 1996


> 
> Burning the floppy would seem to solve the problem.  Lock sensitive
> data in RAM away from disks except for burnable floppies.  I guess
> linux can be configured to keep sensitive data in a RAM filesystem,
> keeping it from being synced or flushed.
> 

Currently, I am hacking up a prototype of an armored keysigning box using
an old 386.

This box signs/decodes incoming E-mail as long as the key switch is in the
correct position.  The key remains in /dev/ram0, and is encrypted, as well
as stored in a .au file.  For one of the keys, I am using a hacked des
program that reads a file off a floppy for the TDES key before copying the
PGP key into the ramdrive.

What I plan to do is write software so that multiple floppies are needed
to load the key into the RAM filesystem, and to "lock" the machine.

After the key is loaded, all network daemons are killed except smail, and
all gettys are killed.  This makes it hard for someone locally to get to
the RAM drive.  If the box is rebooted, or turned off -- bye bye RAM
drive.








More information about the cypherpunks-legacy mailing list