1995-09-04 - Re: Emergency File Wipe Algorithim

Header Data

From: Christian Wettergren <cwe@Csli.Stanford.EDU>
To: Black Unicorn <unicorn@access.digex.net>
Message Hash: f98a1d4eaf7a03443b8adecaab0b979728368566f35696a5b3bfc37564050060
Message ID: <199509042217.PAA17498@Csli.Stanford.EDU>
Reply To: <Pine.SUN.3.91.950904173143.17862B-100000@access2.digex.net>
UTC Datetime: 1995-09-04 22:17:31 UTC
Raw Date: Mon, 4 Sep 95 15:17:31 PDT

Raw message

From: Christian Wettergren <cwe@Csli.Stanford.EDU>
Date: Mon, 4 Sep 95 15:17:31 PDT
To: Black Unicorn <unicorn@access.digex.net>
Subject: Re: Emergency File Wipe Algorithim
In-Reply-To: <Pine.SUN.3.91.950904173143.17862B-100000@access2.digex.net>
Message-ID: <199509042217.PAA17498@Csli.Stanford.EDU>
MIME-Version: 1.0
Content-Type: text/plain



Anon writes>
> When a running computer is seized in some sort of law enforcement
> raid, what are the chances someone would think to backup the
> contents of a RAMDISK drive prior to powering it down?

Also note the recent posting on sci.crypt by Peter Gutmann about being
able to recover data from DRAMs and SRAMs after powerdown. It hits
cryptokeys really bad. 

I suppose this is really academic at the current stage, but that might
change.

/Christian





Thread