Hi,% username%, I'm sure yes. And with our power to make it a reality.
This post is inspired by
this discussion, where it sometimes reached xenomorphs. With us, everything will be easier and more reliable (will they suddenly forget to feed the xenomorph?)
Likbez
- Disk encryption is usually performed by a symmetric algorithm like AES using a key, the maximum size of which for April 2015 rarely exceeds 32 bytes (256 bits)
- To date, there is no documented evidence of the recovery of overwritten data.
- The container encryption key is often a random byte sequence, and it is already encrypted with your password.
- This sequence of bytes together with service information is rarely more than 1 KB. This amount of data can be rewritten in 10 seconds by special methods several thousand times.
')
Thus, under the condition that the disc encryption protocols and algorithms are invulnerable, you
are guaranteed enough to destroy the container header and all header backups to say goodbye to
any amount of encrypted data.
Truecrypt
Despite the fact that the project is dead, his business lives.
Update Apr 2, 2015: Phase II complete. TrueCrypt has been audited.
And so everyone guessed, and there’s no particular place to take a pre-planned hole, it’s painful to realize all the algorithms used in it for a long time. This is not OpenSSL which thread.
So, Truecrypt is an example of an open source program that can be more or less trusted to encrypt large amounts of data with a small (physically) key. Even so: Most likely, you are not so steep that even if you are caught, you will use hypothetical holes in the script to get information from your container.
This is an OpenSource fork of the script, to which new features are carefully added so as not to embarrass the newcomers. For example, after the audit of the trumpet, they increased the number of rounds of password hashing many times so that it now takes a few seconds to wait for the mount. Brutess password, respectively, more difficult as many times + -.
So, these comrades can be asked to make a feature of the safe quick removal of the container header (and its backup)
and such a request even already has
You just need to go in and vote.
And we will have a practical, free, fast way to permanently delete data. Really, really good?
So, we
vote , do not hesitate.