Protecting private key on USB flash drive: how to?

John W. Moore III jmoore3rd at bellsouth.net
Fri May 9 22:01:24 CEST 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

vedaal at hush.com wrote:
> Robert J. Hansen rjh at sixdemonbag.org
> wrote on Fri May 9 19:56:51 CEST 2008 :
> 
>> The interrogator decides to keep on beating you until you decide 
>> to turn over the (nonexistent) hidden volume.
> 
>> there are times when you very much want to prove
>> that you _don't_ have certain data.  
>> TrueCrypt's design makes these sorts of proofs impossible
> 
> 
> not 'impossible'
> just *tediously inconvenient* ;-)

> if you know that you are going to a repressive area where you will 
> be forced to reveal everything and prove that there is nothing left 
> unrevealed,

This simply doesn't happen.  Truly covert Operatives don't carry
anything.  GnuPG [& PGP] are ciphers; great for long winded detail but
unless One is traveling under Diplomatic Cover ciphers are not used.
Codes are used and coded words/phrases may be transmitted by posting on
a Web Site or via Radio Signal.

JOHN ;)
Timestamp: Friday 09 May 2008, 16:00  --400 (Eastern Daylight Time)
- --
The NSA would like to remind everyone to call their mothers this Sunday.
They need to calibrate their system.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.5.0-svn4754: (MingW32)
Comment: Public Key at:  http://tinyurl.com/8cpho
Comment: Gossamer Spider Web of Trust: https://www.gswot.org
Comment: Homepage:  http://tinyurl.com/yzhbhx

iQEcBAEBCgAGBQJIJK2TAAoJEBCGy9eAtCsPxvEH/0eoSV6OJHEl3o8uLqgCNcAn
i0ABslFAFCuRa6CMbh+I9vZhNjRmelMtXMjfnHHhvec4Qktr/n3n3Xe0PT+somFA
DGx3HZVWT6Pm0JVMfNIb2Pfrafy6KQ+KUHmfm4ePiTwnDRXDBuGyYfQEFAZazmGd
k0j5IYgeefuZGW4OEGRAYA+qOvnJiYGa+DD9IwZDVQDEBPImHsrGF1HY0pXsJAUt
2S7Mf1X7gBxc/C0x8Zgqq7J9OeNt/8B+8xitUn1jjA4PGfwt0tP9JOEIYLz8VvyX
1IC5NyfzdQYh7lUCj7NIfimTEXqlmNoj/B18njxG9EaLHZRL+Sfq0X5q046bv+Q=
=AFEk
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list