Nov. 17, 2023, 1:28 a.m. | /u/Redvolition

Privacy & Freedom in the Information Age www.reddit.com

For example, several [Aegis](https://apricorn.com/aegis-secure-key-3z) and [Kingston](https://shop.kingston.com/products/ironkey-d500s-unmanaged-encrypted-usb-flash-drive-fips-140-3-level-3-certified?variant=43826288525504) hardware have a self-destruct PIN or password that performs a crypto-erase, so the reasoning goes like this:

1. Law enforcement from a country with laws not amenable against self-incrimination, such as the UK, or hostile adversaries, or an enraged wife - worst situation of the three - requires you to hand over password.
2. You hand over fake password that actually does a crypto-erasure.
3. Adversary looks into device and it presents as empty. …

adversaries adversary crypto device enforcement fake law law enforcement laws password privacy wife

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff Security Engineering(Cloud Security)

@ Coupang | Seoul, South Korea

Consultant en Gestion de Crise Cyber et Continuité d'Activité H/F

@ Hifield | Sèvres, France

Forensic Service Director

@ PwC | Calgary - 111-5th Avenue Southwest

Information Security Analyst

@ Guidewire Software | India - Bengaluru

Cyber Security Engineer III-IV (Splunk Content Developer/ES Search head Admin)

@ Navy Federal Credit Union | Vienna, VA, United States