Source: cryptsetup-nuke-password
Version: 4+nmu1
Severity: wishlist

Hey.

I think the description should add some important details:

*If* a sufficently advanced 3-letter-government organisation would seize 
someone’s computer,
it's rather unlikely that the idea of wiping the master keys with a special 
passphrase would
work out, since copies of the medium containing the plain dm-crypt / LUKS would 
likely have
been made (quite likely, even unknown to the user... maybe while he wasn’t at 
home).

Instead, unlocking would then not only give proof, that the user actually has 
access to the
encrypted volume (which may already be enouhg to disappear at some black site 
;-) )...
but also give "them" a key (keylogger), which "they" could then use to open the 
device,
simply from some other system, not booting into the one that contains the 
"nuke" code, and just
have access to the data.


I think right now, people may quite easily get a sense of wrong security, while 
they'd
acutally make things worse (by giving out a key).


Cheers,
Chris.


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.6.11-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_DIE
Locale: LANG=en_DE.UTF-8, LC_CTYPE=en_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to