[dm-crypt] nuke password to delete luks header

R3s1stanc3 r3s1stanc3 at riseup.net
Tue Jan 7 00:38:11 CET 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


On 07.01.2014, Claudio Moretti wrote:
> On Mon, Jan 6, 2014 at 9:44 PM, R3s1stanc3 <r3s1stanc3 at riseup.net> wrote:
>
>> I'm thinking of the most extreme case, where the attacker has the
>> resources to bruteforce your password.
>>
>
> Or something like https://xkcd.com/538/ ?
Well yeah, we all know that they will try to force you, to tell your
password. But the attacker will also know, that without the master key,
there is simply no way of restoring the data
-----BEGIN PGP SIGNATURE-----

iF4EAREKAAYFAlLLPmMACgkQUaCkMJCt6r6G3wD9EZS+e0YaoxaIY2VuaGa8ilrH
DOzxDg7TM8yKPHxpKOUA/A9xvdEZFSxp+gvNzhWHlW3EZT3wZ9eJg94VpyuSQ9/I
=BPfa
-----END PGP SIGNATURE-----

-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0xDBCB4A0A.asc
Type: application/pgp-keys
Size: 21034 bytes
Desc: not available
URL: <http://www.saout.de/pipermail/dm-crypt/attachments/20140107/299184d5/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0xDBCB4A0A.asc.sig
Type: application/pgp-signature
Size: 96 bytes
Desc: not available
URL: <http://www.saout.de/pipermail/dm-crypt/attachments/20140107/299184d5/attachment.sig>


More information about the dm-crypt mailing list