Emergency destruction of LUKS partition
aragonx at dcsnow.com
aragonx at dcsnow.com
Mon Sep 30 20:27:15 UTC 2013
> On Mon, Sep 30, 2013 at 12:52:13 -0400,
> "Eric H.
Christensen" <sparks at fedoraproject.org> wrote:
>
> They'll just keep using the wrench until you tell them all of
the
> passwords.
>
> Even plausible deniability
might not work so well, if someone who knows
> what their doing
looks at you disk.
If your data is valuable enough (or you are
paranoid enough) you could try something like this:
There are
services that provide disappearing web sites. You could have your
encryption program make part of your key from such a web site. Every
time you decrypt your volume for use, it removes the old site/key and
creates a new site/key (which you would have to memorize). The site
would disappear after 24 hours automatically or 2 failed login
attempts. So, if you wait long enough or give them a bad password,
your data is gone because you no longer actually have the key. Well,
there isn't a key anymore so...
---
Will Y.
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.fedoraproject.org/pipermail/security/attachments/20130930/01bcabde/attachment.html>
More information about the security
mailing list