From: Black Unicorn <unicorn@access.digex.net>
To: Anonymous <anon-remailer@utopia.hacktic.nl>
Message Hash: ef038571eae44e8b69c1cf8fd314a091733546e8d5c2eb7e0b6e868235265a64
Message ID: <Pine.SUN.3.91.950904173143.17862B-100000@access2.digex.net>
Reply To: <199509041725.TAA12314@utopia.hacktic.nl>
UTC Datetime: 1995-09-04 21:36:54 UTC
Raw Date: Mon, 4 Sep 95 14:36:54 PDT
From: Black Unicorn <unicorn@access.digex.net>
Date: Mon, 4 Sep 95 14:36:54 PDT
To: Anonymous <anon-remailer@utopia.hacktic.nl>
Subject: Re: Emergency File Wipe Algorithim
In-Reply-To: <199509041725.TAA12314@utopia.hacktic.nl>
Message-ID: <Pine.SUN.3.91.950904173143.17862B-100000@access2.digex.net>
MIME-Version: 1.0
Content-Type: text/plain
On Mon, 4 Sep 1995, Anonymous wrote:
> Date: Mon, 4 Sep 1995 19:25:07 +0200
> From: Anonymous <anon-remailer@utopia.hacktic.nl>
> To: mail2news@utopia.hacktic.nl, cypherpunks@toad.com
> Newgroups: alt.security.pgp, alt.politics.org.fbi
> Subject: Re: Emergency File Wipe Algorithim
>
> When a running computer is seized in some sort of law enforcement
> raid, what are the chances someone would think to backup the
> contents of a RAMDISK drive prior to powering it down?
>
>
Why would you even ask this question? If the odds are > 0 (which they
are) they are too high as the solution is simple.
A screensaver which shuts down the system entirely if anything but "}" is
pressed.
If any key but the secret one is pressed by an excited agent, the ramdisk
is gone. If the computer is simply powered down, the ramdisk is gone.
I suggest, rather than a ramdisk however, an encrypted partition al la
CryptDisk or Secure(Drive? Device?).
---
00B9289C28DC0E55 nemo repente fuit turpissimus - potestas scientiae in usu est
E16D5378B81E1C96 quaere verum ad infinitum, loquitur sub rosa - wichtig!
*New Key Information* - Finger for key revocation and latest key update.
Return to September 1995
Return to “hallam@w3.org”