[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Returned mail: User unknown



The original message was received at Mon, 4 Sep 1995 17:35:13 -0400
from unicorn@localhost

   ----- The following addresses had delivery problems -----
Anonymous <[email protected]>  (unrecoverable error)

   ----- Transcript of session follows -----
... while talking to utopia.hacktic.nl.:
>>> RCPT To:<[email protected]>
<<< 550 <[email protected]>... User unknown
550 Anonymous <[email protected]>... User unknown
451 [email protected]... reply: read error from toad.com.

   ----- Original message follows -----


On Mon, 4 Sep 1995, Anonymous wrote:

> Date: Mon, 4 Sep 1995 19:25:07 +0200
> From: Anonymous <[email protected]>
> To: [email protected], [email protected]
> Newgroups: alt.security.pgp, alt.politics.org.fbi
> Subject: Re: Emergency File Wipe Algorithim
> 
> When a running computer is seized in some sort of law enforcement
> raid, what are the chances someone would think to backup the
> contents of a RAMDISK drive prior to powering it down?
> 
> 

Why would you even ask this question?  If the odds are > 0 (which they 
are) they are too high as the solution is simple.

A screensaver which shuts down the system entirely if anything but "}" is 
pressed.

If any key but the secret one is pressed by an excited agent, the ramdisk 
is gone.  If the computer is simply powered down, the ramdisk is gone.

I suggest, rather than a ramdisk however, an encrypted partition al la 
CryptDisk or Secure(Drive? Device?).


---
00B9289C28DC0E55 nemo repente fuit turpissimus - potestas scientiae in usu est
E16D5378B81E1C96 quaere verum ad infinitum, loquitur sub rosa    -    wichtig!
*New Key Information*    -    Finger for key revocation and latest key update.