Re: data remanence (was: Some legal trouble with TOR in France)
On Mon, 15 May 2006 07:15:55 +0200 cesare VoltZ <[EMAIL PROTECTED]> wrote: > What do you think about to start TOR with Knoppix Linux booted from a > CD/Rom? There's something similar to this (but better in my opinion) built around OpenBSD. It routes all external TCP traffic through Tor, and even spoofs aNY subtle OS "fingerprints" to look like something else to the outside world. http://sourceforge.net/projects/anonym-os/ -- Hand Crafted on Mon. May 15, 2006 at 01:41 Outside of a dog, a book is a man's best friend. Inside of a dog, it's too dark to read. -- Groucho Marx
Re: data remanence (was: Some legal trouble with TOR in France)
On Sun, May 14, 2006 at 08:29:06PM -0400, Michael Holstein wrote: >> There are methods (and they are used) to read data from a overwritten >> disk. > Has anyone tried creating a (ro) flash-boot linux system for TOR > with all the (rw) stuff mounted in RAM ? Flash is writable, so can be tampered. The critical secret (the server's key) is in the ro part. So what good is it? Really, guys. If it is protection against governments you want, you are barking up the wrong tree. Too difficult. -- Lionel
Re: data remanence (was: Some legal trouble with TOR in France)
What do you think about to start TOR with Knoppix Linux booted from a CD/Rom? CesareOn 5/15/06, Michael Holstein <[EMAIL PROTECTED]> wrote: > There are methods (and they are used) to read data from a overwritten > disk.Has anyone tried creating a (ro) flash-boot linux system for TOR withall the (rw) stuff mounted in RAM ?Such a device would raise the bar quite a bit, no? (AFIK, there is no data remanence problem with DRAM .. unless $they can stop the clock andkeep power applied).(seeing the $agency come in with a UPS and trying to splice the A/Cwithout shutting it off, and then carrying out the server on battery power conjures up memories of a certian Seinfield episode)./mike.
Re: data remanence (was: Some legal trouble with TOR in France)
--- Michael Holstein <[EMAIL PROTECTED]> wrote: > AFIK, there is no data remanence problem with DRAM Not apparently. I sent one of these links earlier in this thread IIRC. These papers are by Peter Gutman himself. "7. Methods of Recovery for Data stored in Random-Access Memory" "8. Erasure of Data stored in Random-Access Memory" http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html Data Remanence in Semiconductor Devices -- all 19 pages http://www.cypherpunks.to/~peter/usenix01.pdf It's been a few years since I've read these articles personally.
data remanence (was: Some legal trouble with TOR in France)
> There are methods (and they are used) to read data from a overwritten > disk. Has anyone tried creating a (ro) flash-boot linux system for TOR with all the (rw) stuff mounted in RAM ? Such a device would raise the bar quite a bit, no? (AFIK, there is no data remanence problem with DRAM .. unless $they can stop the clock and keep power applied). (seeing the $agency come in with a UPS and trying to splice the A/C without shutting it off, and then carrying out the server on battery power conjures up memories of a certian Seinfield episode). /mike.