surrendering one's passphrase to authorities
gerry_lowry (alliston ontario canada)
gerry.lowry at abilitybusinesscomputerservices.com
Wed Mar 4 18:05:58 CET 2009
on vedaal's laptop design ...
 marry the drive to the motherboard so that removing the drive
to another computer would cause the drive to self destruct.
 design the drive as a secondary only never bootable drive;
it's sister drive would carry the O/S and detect any O/S
tampering; the data drive would use non standard
logical and physical architecture to require specialized
drivers in order to be accessed, i.e., no generic access.
 design the drive to fail if physically opened or probed.
 design the drive to be not probable by any form of hands off
 remove dependency of need  destruct activation by any human.
 destruct the drive immediately if the smart card is yanked out
improperly; probably removal should be almost equally brief, example:
Ctrl+x, Ctrl+y,Ctrl+z, where x, y, and z are user configurable.
 find financing for this technology.
P.S.: "Cryptonomicon", Neal Stephenson, ISBN: 9780060512804; ISBN10: 0060512806;
The "... crypto-hacker grandson, Randy" character, "is attempting to create ... a
place where encrypted data can be stored and exchanged free of repression and scrutiny";
there are some interesting laptop related ideas in the novel; also, the book uses in
its plot a deck of cards for passing encrypted messages back and forth undetected;
there is also an appendix that describes the algorithm for using the deck of cards;
that appendix and algorithm design was created by Bruce Schnier, example:
http://www.jera.com/solitaire/ "Solitaire for KJava home page"; especially see
http://www.schneier.com/solitaire.html "The Solitaire Encryption Algorithm", version 1.2, 5/26/99.
More information about the Gnupg-users