<html><head></head><body>I have literally never in my life seen any meaningful use case for the OTP after about 1974.<br><br>It's not part of a sensible discussion. :)<br><br><div class="gmail_quote">On May 4, 2021 4:46:31 PM CDT, vedaal via Gnupg-users <gnupg-users@gnupg.org> wrote:<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<span style="font-family: Arial; font-size: 14px; line-height: 150%;">Or, for the really paranoid ;-)<div>you can have random data on a read-only mini cdrom,</div><div>and use it as an OTP, and throw it into a garbage incinerator afterwards.</div><div><br></div><div>If you are up against adversaries where this is necessary,</div><div>this methods may ultimately not help ...</div><div><br></div><div>=====<br><br>On 5/4/2021 at 1:19 PM, "Ingo Klöcker" <kloecker@kde.org> wrote:<blockquote style="border-left:solid 1px #ccc;margin-left:10px;padding-left:10px;">On Dienstag, 4. Mai 2021 18:47:50 CEST Robert J. Hansen via Gnupg-users wrote:<br>> For modern SSDs I generally recommend a single pass with random data:<br>> <br>> dd if=/dev/urandom of=/dev/foo bs=1M<br>> <br>> (Don't forget the blocksize [bs] parameter; it can improve speed<br>> significantly.)<br>> <br>> This is enough to foil the vast majority of forensic analysis. Yes,<br>> yes, SSDs have remapping capabilities which means certain memory cells<br>> won't get hit even if you do this, and it's theoretically possible for a<br>> good forensics nerd to do all kinds of wild magic to pull off data you<br>> didn't even know was there... but that kind of very high-level forensics<br>> nerdery costs a lot of money, and few people are worth that kind of<br>> investment.<br><br>I'd always use full disk encryption ideally with the key stored on a USB <br>token. Otherwise, with a very good passphrase.<br><br>And, after use, wipe the disk and destroy the token.<br><br>Modern enterprise-level SSDs also have secure erase, but, of course, you'd <br>have to trust the hardware manufacturer to implement it properly without any <br>backdoors which you probably don't want to do in the above scenario.<br><br>Regards,<br>Ingo</blockquote></div></span></blockquote></div><br>-- <br>Sent from my Android device with K-9 Mail. Please excuse my brevity.</body></html>