[liberationtech] LUKS "Self-Destruct" feature introduced in Kali Linux
Pranesh Prakash
pranesh at cis-india.org
Fri Jan 17 19:02:36 PST 2014
This might be of interest to some on this list:
http://www.kali.org/how-to/nuke-kali-linux-luks/
The LUKS encrypted partition self-destructs if a specific "nuke password" is used.
> Our main purpose for introducing this feature in Kali Linux is to simplify the process of securely traveling with confidential client information. While “LUKS Nuking” your drive will result in an inaccessible disk, it is possible to backup your keyslots beforehand and restore them after the fact. What this allows us to do is to “brick” our sensitive laptops before any travel, separate ourselves from the restoration keys (which we encrypt), and then “restore” them to the machines once back in a safe location. This way, if our hardware is lost or otherwise accessed midway through our travels, no one is able to restore the data on it, including ourselves.
This above description seems to me to be an extreme case of 2FA. Is it actually useful?
By contrast, Guardian Project's ChatSecure has a simple self-destruct button and TrueCrypt allows for hidden volumes that can be accessed through a different password.
--
Pranesh Prakash
Policy Director, Centre for Internet and Society
T: +91 80 40926283 | W: http://cis-india.org
-------------------
Access to Knowledge Fellow, Information Society Project, Yale Law School
M: +1 520 314 7147 | W: http://yaleisp.org
PGP ID: 0x1D5C5F07 | Twitter: https://twitter.com/pranesh_prakash
More information about the liberationtech
mailing list