Re: Emergency destruction of LUKS partition

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On Mon, Sep 30, 2013 at 12:52:13 -0400,
> "Eric H. Christensen" <sparks@xxxxxxxxxxxxxxxxx> wrote:
>
> They'll just keep using the wrench until you tell them all of the
> passwords.
>
> Even plausible deniability might not work so well, if someone who knows
> what their doing looks at you disk.

If your data is valuable enough (or you are paranoid enough) you could try something like this:

There are services that provide disappearing web sites.  You could have your encryption program make part of your key from such a web site.  Every time you decrypt your volume for use, it removes the old site/key and creates a new site/key (which you would have to memorize).  The site would disappear after 24 hours automatically or 2 failed login attempts.  So, if you wait long enough or give them a bad password, your data is gone because you no longer actually have the key.  Well, there isn't a key anymore so...

---
Will Y.
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
--
security mailing list
security@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/security

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Coolkey]

  Powered by Linux