1996-11-17 - Re: ideal secure personal computer system

Header Data

From: snow <snow@smoke.suba.com>
To: azur@netcom.com (Steve Schear)
Message Hash: 53a45fd5cf79f4c4d5edec92c74ed84596e1ed47f6d4c4bff1a00203f48777be
Message ID: <199611170553.XAA02749@smoke.suba.com>
Reply To: <v02140b01aeb3002591ab@[10.0.2.15]>
UTC Datetime: 1996-11-17 05:36:42 UTC
Raw Date: Sat, 16 Nov 1996 21:36:42 -0800 (PST)

Raw message

From: snow <snow@smoke.suba.com>
Date: Sat, 16 Nov 1996 21:36:42 -0800 (PST)
To: azur@netcom.com (Steve Schear)
Subject: Re: ideal secure personal computer system
In-Reply-To: <v02140b01aeb3002591ab@[10.0.2.15]>
Message-ID: <199611170553.XAA02749@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain


> >A friend of mine just got back from a kerberos conferance at MIT, at
> >dinner one night they were talking about fun-n-easy ways to extract
> I discussed this seriously with an engineering acquaintence who has done
> drive design for a number of major companies.  He thought this could be
> easily achieved technically but might present some significant hurdles for
> getting UL approval :-)  Seriously though, there might be a market for an
> Mission Impossible drive retrofit kits which could be triggered by SW or
> HW.

     Well, how about this: spaced between each platter is 2 small files,
when the destroy is iniated, they simple dust off the platters. 

     Problem: 
     Power has to be on, 
     solution: don't turn the machine off unless you have to.   
               small (just enough to spin the drives up) battery in the
               drive case. 

     This shouldn't have too much trouble getting by the U.L.

Petro, Christopher C.
petro@suba.com <prefered for any non-list stuff>
snow@smoke.suba.com





Thread