Date: Fri, 30 Jan 2004 21:30:23 +0100 From: "Poul-Henning Kamp" <phk@phk.freebsd.dk> To: =?ISO-8859-1?Q?=DE=F3r=F0ur_=CDvar_Bj=F6rnsson?= <thib@heimsnet.is> Cc: freebsd-geom@freebsd.org Subject: Re: A question or maybe a request or something or other Message-ID: <10025.1075494623@critter.freebsd.dk> In-Reply-To: Your message of "Fri, 30 Jan 2004 20:28:56 GMT." <20040130202856.65e2acbb.thib@heimsnet.is>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <20040130202856.65e2acbb.thib@heimsnet.is>, =?ISO-8859-1?Q?=DE=F3r=F0ur_=CDv ar_Bj=F6rnsson?= writes: >I was reading phk@ gbde paper ( wich he presented at bsdcon03 ) >and I had an idea, I think that alot of other people have had the >same idea but I have not seen it discussed anywhere. Now to the >meat of it, I was wondering if there would be an option for setting >a passphrase whom would initiate a self descrut sequence ( destroying >all data on a particular disk when entered or even just a portion >of the data on that disk ). This would be a fisable option in a >real world situation if an attacker is putting pressure on somebody >to give up the passphrase ( Well the victim might end up with a 9 >mm through his skull in a worst case scenario ) but still. This is planned, but not yet implemented for lack of time. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?10025.1075494623>