Michael Garibaldi wrote: > Obviously the police are not going to find one's USB stick on the > computer, when one is not home. The stick is ONLY used for booting and > then carefully hidden. It does not matter if the "self destruct" works > or not, what matters is that there is absolutely no reason to even > suspect that a different kind of encryption is being used on the > system. It boots from the HDD and uses all the available space, and > the police will get the key that will unlock > the fake system, and that's it. As long as the USB stick is kept safe > (which should be trivial to do), they have absolutely nothing to even > suggest there being a parallel system encrypted with other keys. The timestamps will show that the files weren't accessed for months or even years. And there are also all those logfiles in /var/log which include dates. I think there will be enough proof that the system wasn't can't be the system you are normally using. -- Thomas Weinbrenner - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/