[IP] One Internet provider's view of FBI's CALEA wiretap push

Major Variola (ret) mv at cdc.gov
Fri Apr 23 12:45:38 PDT 2004


t 10:09 AM 4/23/04 -0400, Tyler Durden wrote:
>"I wonder how quickly one could incinerate a memory card in the field
>with high success rate?   Destroy the data and the passphrases don't
>help."
>
>Well, what if there were 3 passwords:
>
>1) One for Fake data, for amatuers (very few of the MwG will actually
be
>smart enough to look beyond this...that's why they have guns)
>2)One for real data...this is what you're hiding
>3) One for plausible real data, BUT when this one's used, it also
destroys
>the real data as it opens the plausible real data.

The first thing cops do is make backups of the harddrives.
So you can't destroy the "real data".

You would need a tamper-"proof" card (ie trusted security region)
to implement this.  None of the commercial memory gizmos,
from USB dongles to stamp-sized memory cards, do this.
None of the smart cards are user programmable and none
include secure wipe, AFAIK.  Do PDA apps?  How do they
store data between battery changes?

Is it enough to hold a tiny memory card for a minute over a lighter?
Merely snapping the card into pieces?   Does one need to
make a scene with fireworks?   (I'm remembering that spammer
who tried to eat a small memory card.)





More information about the cypherpunks-legacy mailing list