Search Mailing List Archives
[liberationtech] secure wipe of flash memory
michael at briarproject.org
Mon Jul 16 14:53:05 PDT 2012
-----BEGIN PGP SIGNED MESSAGE-----
On 16/07/12 18:34, James Vasile wrote:
> I've always assumed the flash problem implied two practices:
> 1) Don't save sensitive data in unencrypted form 2) Don't use a
> swap partition
> Given the limitations of devices as they currently are, is there
> anything else you would do?
The only other thing I can think of is to use an encryption scheme
that's secure if the adversary gets multiple versions of the ciphertext.
I'm not sure how LUKS, TrueCrypt, etc stack up in this regard.
SQLCipher looks secure as far as I can tell (but I'm *not* a
cryptographer) because it uses a fresh random IV each time it writes a
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
-----END PGP SIGNATURE-----
More information about the liberationtech