On Wed, Jul 15, 2009 at 8:23 PM, Matt Rosales<ttammar@xxxxxxxxx> wrote: > On a somewhat related note, I was thinking it would be cool to build in a > self-destruct mechanism into cryptsetup- IE if a specific password is > entered twice, have it destroy the keyblock of the encrypted disk. Thoughts? Probably pointless. Could help against the most unskilled of attackers. (One's who didn't make a copy of your disk and had never read/knew of cryptsetup features and had not conceived software would do such a thing). FWIW I do know the OpenPGP card used to lock itself on entering the wrong pin too many times. So using a cryptotoken and a password could achieve a similar outcome (with the advantage that now your attacker has the expensive task of defeating your token). -- Roscoe --------------------------------------------------------------------- dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx