You are viewing a single comment's thread.

view the rest of the comments →

0
0

[–] 16204066? ago 

11836667

One thing that's gotta happen ASAP is an extra otp layer for fde and for coms, particularly text chat & (text) email.

Even with 90's tech it was already possible to establish a 100% uncrackable line of communication with someone with whom you have occasional physical contact, by physical exchange of CD's containing otp. Imperfect, because they couldn't be destroyed. Well, now we have HDD, which can be erased, and also which can be effectively destroyed (by heating the platter with a flame).

This is to be used in ADDITION to whatever encryption you may prefer, AES being surely adequate for most purposes.

0
0

[–] 16204111? ago 

Huh? You can easily destroy CDs or DVDs by dousing them in gasoline and setting them on fire. Destroying HDD is harder. You have to sand down the platters.

0
0

[–] 16204072? ago 

11839039

>>11836708

>>11839060

Also, in addition to DBAN, you want to always be using full disk encryption (FDE) - but, if you use FDE, you need to have an excellent backup system, with offsite backups.

And this gets into the topic of keyfiles, like using a thumb drive to store a key for VeraCrypt. The degree to which this increases security is amazing. You go from "maybe they can guess your password" to "they gotta find that damn thumb drive".

0
0

[–] 16204078? ago 

>>11839076

about the thumb key drive, isn't it possible for someone to just map the usb drive then crack it that way? something about this doesn't add up. someone mind shedding some light on this?

0
0

[–] 16204074? ago 

That is, "they gotta find that damn thumb drive AND then try to guess the password"