Home Computer Audio Asylum

Music servers and other computer based digital audio technologies.

RE: You can encrypt the contents, then securely erase when it's time....

You entirely misunderstood the gist of my Snowden comments. I had already figured out by 1994 that the NSA was in bed with at least one major O/S company. I knew that by conversations with people "in the know" who were "split brained", i.e. had crypto security clearances. It was not hard to figure out what was going on from talking with these people, since when you got too close to the edge you could see their faces tense up. Pressing them some more, you soon reached the point where they said, "I can't discuss this any further." I suspect the processor hardware is equally untrustworthy. It only takes a single extra wire in a chip to implement a hidden trap door.

The encryption keys have to be stored somewhere. So if the disk is encrypted the key has to be unencrypted, or protected by a password that the user types in. So you may be able to discard an encrypted disk, but if so you will have to enter a strong password at boot or trust some other portion of the system that contains the encryption key.

Tony Lauck

"Diversity is the law of nature; no two entities in this universe are uniform." - P.R. Sarkar


This post is made possible by the generous support of people like you and our sponsors:
  Atma-Sphere Music Systems, Inc.  


Follow Ups Full Thread
Follow Ups

FAQ

Post a Message!

Forgot Password?
Moniker (Username):
Password (Optional):
  Remember my Moniker & Password  (What's this?)    Eat Me
E-Mail (Optional):
Subject:
Message:   (Posts are subject to Content Rules)
Optional Link URL:
Optional Link Title:
Optional Image URL:
Upload Image:
E-mail Replies:  Automagically notify you when someone responds.