Emergency destruction of LUKS partition

aragonx at dcsnow.com aragonx at dcsnow.com
Mon Sep 30 20:27:15 UTC 2013



> On Mon, Sep 30, 2013 at 12:52:13 -0400,
> "Eric H.
Christensen" <sparks at fedoraproject.org> wrote:
> 
> They'll just keep using the wrench until you tell them all of
the
> passwords.
> 
> Even plausible deniability
might not work so well, if someone who knows
> what their doing
looks at you disk.

If your data is valuable enough (or you are
paranoid enough) you could try something like this:

There are
services that provide disappearing web sites.  You could have your
encryption program make part of your key from such a web site.  Every
time you decrypt your volume for use, it removes the old site/key and
creates a new site/key (which you would have to memorize).  The site
would disappear after 24 hours automatically or 2 failed login
attempts.  So, if you wait long enough or give them a bad password,
your data is gone because you no longer actually have the key.  Well,
there isn't a key anymore so...

---
Will Y.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.fedoraproject.org/pipermail/security/attachments/20130930/01bcabde/attachment.html>


More information about the security mailing list