[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: What the NSA is patenting
> Burning the floppy would seem to solve the problem. Lock sensitive
> data in RAM away from disks except for burnable floppies. I guess
> linux can be configured to keep sensitive data in a RAM filesystem,
> keeping it from being synced or flushed.
Currently, I am hacking up a prototype of an armored keysigning box using
an old 386.
This box signs/decodes incoming E-mail as long as the key switch is in the
correct position. The key remains in /dev/ram0, and is encrypted, as well
as stored in a .au file. For one of the keys, I am using a hacked des
program that reads a file off a floppy for the TDES key before copying the
PGP key into the ramdrive.
What I plan to do is write software so that multiple floppies are needed
to load the key into the RAM filesystem, and to "lock" the machine.
After the key is loaded, all network daemons are killed except smail, and
all gettys are killed. This makes it hard for someone locally to get to
the RAM drive. If the box is rebooted, or turned off -- bye bye RAM