https://www.kali.org/tutorials/emergency-self-destruction-luks-kali/
TL;DR this patch uses one LUKS keyslot to add a password which wipes the LUKS header, effectively making all data in the LUKS container inaccessible until the header is restored.
Perfect for when you're being asked for a password, especially because you can pretend it was the examiners fault that the drive is "dead."
You can then (hopefully) go home and redtore the LUKS header from a separate location and go about your merry day.
Thoughts? If no one strongly disagrees I can put it in an issue.
My thoughts were more along the lines of mitigative travel protection crossing borders and such. Like, you can boot to decryption but if the device is seized, no valid decryption can actually be performed. But as you say, depending on your situation that could be disadvantageous. I additionally just enjoy the idea of separating keys from locks regardless of the encrypted state of those keys.
Let me know what you think. Maybe if it doesn't go into qubes mainline it could be better served ending up as a guide somewhere, I'd be happy to do that on my own and post about it.
Thanks!
However if
If you had a limit of 10 or 20 tries before drive wipe.
And had a dozen or more fake passwords that would induce drive wipe.
And had some sort of delay in each password attempt built in.(veracrypt takes forever to process your password input for instance)
Using tpm ontop of this would also at least frustrate their attempts at mirroring the drive.
You could be reasonably certian that even powerful attempts at getting the drive open will be hopeless. Though, you may get yourself in some physical trouble.
I have wanted features like the above ones for some time.
The recent incident with an older iphone is one example that the method I mention still works. Whatever the newer iphones use is supposed to improve on that.
perhaps a fast option will be a strong encrypted disk and the nuke feature to destroy the password or better password-expansion (a hash which is longer than the password)...
- full disk encryption
- double full disk encryption with two independent passwords and independent encryption schemes
- customization of keyword length
- customization of the cipher
- no storage of passwords only of the password-expansion (which don't shorten the password like the standard hash, which makes the original password longer, so if you steal the disk you get some extra effort to crack the code)
- customization of the wrong tries, e.g. 10 times and than the "password-hashes" get wiped out (this avoids a simple brute forward attack)
- long key setup-time (of ca. 0.5 seconds), will slow down sophisticated brute forward attacks
In the end of the day the security of the password management, the security of one or the other cipher and the effectiveness of the wiping will safe your information.
Pro: It will be very fast (approx. under 3 seconds)
Cons: Not water-proof against Quantum Computer Attacks (you will need more modern ciphers)
Kind Regards
imagine you have many files with CID data (customer identified data) and you must protect them after the EU data protection law.
Now you must clean all data of the customer x.
And this should be secure.
A simple trick might be to use encryption. All files get encrypted with a own key. Instead of wiping the files, you can can simple destroy the keys (in a very secure way).
This is simple and fast.
But, it will be only valid, if and olny if the encryption will hold and really is safe.
Ok, the only way to do this will be the one time pad, which is absolutely secure (as long the length is long enough to prevent the guessing).
But for practical reasons, this might be take big disk spaces.
For a compromise you can combine two ciphers, so if one will work and the other will get problems today or tomorrow, this "smart wiping" of files, will work.
And by the way, if qubes os will have it's own real non-deterministic random generator, you can use the OTP to secure the passwords itself, which have a very limited disk space, so this will be feasible.
Kind Regards