In Reply to: RE: You can encrypt the contents, then securely erase when it's time.... posted by AbeCollins on November 22, 2014 at 09:38:54:
You entirely misunderstood the gist of my Snowden comments. I had already figured out by 1994 that the NSA was in bed with at least one major O/S company. I knew that by conversations with people "in the know" who were "split brained", i.e. had crypto security clearances. It was not hard to figure out what was going on from talking with these people, since when you got too close to the edge you could see their faces tense up. Pressing them some more, you soon reached the point where they said, "I can't discuss this any further." I suspect the processor hardware is equally untrustworthy. It only takes a single extra wire in a chip to implement a hidden trap door.
The encryption keys have to be stored somewhere. So if the disk is encrypted the key has to be unencrypted, or protected by a password that the user types in. So you may be able to discard an encrypted disk, but if so you will have to enter a strong password at boot or trust some other portion of the system that contains the encryption key.
Tony Lauck
"Diversity is the law of nature; no two entities in this universe are uniform." - P.R. Sarkar
This post is made possible by the generous support of people like you and our sponsors:
Follow Ups
- RE: You can encrypt the contents, then securely erase when it's time.... - Tony Lauck 11/22/1411:17:28 11/22/14 (2)
- RE: You can encrypt the contents, then securely erase when it's time.... - AbeCollins 09:30:29 11/24/14 (0)
- RE: You can encrypt the contents, then securely erase when it's time.... - fmak 08:45:55 11/24/14 (0)