storage privacy (was: Nice quiet, private, anonymous life??)

mark485anderson at eml.cc mark485anderson at eml.cc
Tue Dec 4 20:35:49 UTC 2007


By "full disk encryption" I guess your talking about access via a pass
phrase.

Judge: "Ok you are to be held in contempt and in jail xyz, until such
time as you give us the pass phrase to your data"

Most data overwrite programs take too long-you do not have that time
when they are knocking down your door.

A strong magnetic field close to the hard drive will completely destroy
the data making it impossible to recover. I will also probably fuckup
the drive mechanism, rendering the drive useless. Someone said consumer
demagnetizers were not sufficently strong? How do you know this?

I have not run a tor server, so I do not know the exact requirements.
Can it be done from a ram drive?

Explosives and incendiaries are a poor choice for obvious reasons. Want
to add arson and terrorism to your charges?

I am not saying magnetism is the only way or even the best way, but a
way, assuming you have recent backups at an undisclosed, secure
location.


On Sun, 02 Dec 2007 17:54:40 -0800, "F. Fox" <kitsune.or at gmail.com>
said:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> coderman wrote:
> > apologies in advance for veering this far off topic...
> > 
> > On Dec 2, 2007 2:25 PM, F. Fox <kitsune.or at gmail.com> wrote:
> >> [ strange, dangerous, and likely to fail methods for destroying drives ]
> > 
> > use full disk encryption, even the latest ubuntu supports this.
> > 
> > destroy the disk keys and you've got platters full of entropy.
> > 
> > anything else is just a bad idea.
> > 
> (snip)
> 
> I don't think much of the aforementioned physical "destruction" methods;
> I also agree in that full disk encryption is the best way to go, if at
> all possible.
> 
> However, given that a system has already been deployed without such
> encryption, wouldn't secure overwriting be a reasonable way of
> destroying such data?
> 
> It'd be slow, and maybe not effective against the most determined (and
> well-funded) attackers - but at least it wouldn't be dangerous, weird,
> and violent... =:oD
> 
> - --
> F. Fox
> CompTIA A+, Net+, Security+
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.7 (GNU/Linux)
> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
> 
> iD8DBQFHU2HfbgkxCAzYBCMRAj0dAJ92NHfJqZVVcK/u99gbWTo0jsSnFACeOSJW
> EmV8OG+cGBSMlWBGXfqvh1M=
> =hc2d
> -----END PGP SIGNATURE-----
-- 
  
  mark485anderson at eml.cc

-- 
http://www.fastmail.fm - And now for something completely different




More information about the tor-talk mailing list