Originally posted by birdie
View Post
Announcement
Collapse
No announcement yet.
A Self-Destruct Option For Linux Disk Encryption
Collapse
X
-
-
Originally posted by birdie View PostThe article specifically says that the password is "nuke". Has anyone even read it? What a bunch of 1st grade kids.
Leave a comment:
-
Originally posted by Ericg View PostWhat makes you think it wouldn't be configurable..? Like its so blatantly common sense that just saying that it might not be makes you come off.... lacking of common sense o.O
Leave a comment:
-
Originally posted by speculatrix View Postwhat they need to do is a password which switches in a dummy near-empty file system which contains a bit of soft pr0n so as to give plausible deniability.
some people may mock, but there are countries in the world where using disk encryption can result in an instant prison sentence if you don't immediately comply with the authorities, so having some dummy data is a good idea. Hence why trucrypt can have multiple hidden volumes.
Leave a comment:
-
Guest repliedOriginally posted by Tuxee View PostWhat makes you think this password is not configurable?
Leave a comment:
-
I implemented a similar feature to this in my local branch of Geli (the FreeBSD disk encryption framework). Granted, it's next to useless if you are under a very major investigation (wherein your disk is cloned first) but for other situations, e.g. 'spot checks', it's very useful to have. Nice to see it being implemented more widely.
Leave a comment:
-
Originally posted by A Laggy Grunt View PostWhat's it to be used for?
Originally posted by A Laggy Grunt View PostIf someone is telling you to put your password in so they can get at your files, or maybe several nuke passwords for someone to accidentally find when trying to decrypt a drive.
Originally posted by A Laggy Grunt View PostOnce people figure out this feature exists, the new standard operating procedure for this kind of thing will be "mirror the drive first."
Leave a comment:
-
What's it to be used for? If someone is telling you to put your password in so they can get at your files, or maybe several nuke passwords for someone to accidentally find when trying to decrypt a drive.
Once people figure out this feature exists, the new standard operating procedure for this kind of thing will be "mirror the drive first."
Leave a comment:
-
what they need to do is a password which switches in a dummy near-empty file system which contains a bit of soft pr0n so as to give plausible deniability.
some people may mock, but there are countries in the world where using disk encryption can result in an instant prison sentence if you don't immediately comply with the authorities, so having some dummy data is a good idea. Hence why trucrypt can have multiple hidden volumes.
Leave a comment:
-
This reminds me of all the noise about rm -rf.
Great job Kali, very welcome feature.
Leave a comment:
Leave a comment: