Date: Thu, 14 Jul 2005 21:37:36 +0100 From: David Kreil <kreil@ebi.ac.uk> To: David Kreil <kreil@ebi.ac.uk> Cc: freebsd-fs@freebsd.org, Poul-Henning Kamp <phk@haven.freebsd.dk>, freebsd-questions@freebsd.org Subject: Re: gbde blackening feature - how can on disk keys be "destroyed" thoroughly? Message-ID: <200507142037.j6EKbaf12941@parrot.ebi.ac.uk> In-Reply-To: Your message of "Sun, 05 Sep 2004 15:26:42 BST." <200409051426.i85EQgB18118@puffin.ebi.ac.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
Dear Poul-Henning, After a job induced pause in my strong interest in encryption solutions, = I = have on my return tried to learn what has since changed with gbde. I must= be = missing the obvious because I cannot locate a "changelog" or "release not= es" = document. You have been most helpful in our discussion last year. I have now, in = particular, been wondering whether you have since at all had a chance of = revisiting the issue of blackening keys with multiple physical random = overwrite before resetting them to zero to avoid key recovery by methods = as = available from companies like www.dataclinic.co.uk. With many thanks and best regards, David. -------------------------------------------------------------------------= -- Dr David Philip Kreil = Research Fellow, Darwin College, | WWTF Vienna Science Chair of University of Cambridge | Bioinformatics, Dept of Biotechnology, ++44 1223 764107, fax 7092 810040 | c/o IAM / BOKU, A-1190 Muthgasse 18 www.inference.phy.cam.ac.uk/dpk20 | ++43 1 360066830
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200507142037.j6EKbaf12941>