Nov. 17, 2023, 1:28 a.m. | /u/Redvolition

Privacy & Freedom in the Information Age www.reddit.com

For example, several [Aegis](https://apricorn.com/aegis-secure-key-3z) and [Kingston](https://shop.kingston.com/products/ironkey-d500s-unmanaged-encrypted-usb-flash-drive-fips-140-3-level-3-certified?variant=43826288525504) hardware have a self-destruct PIN or password that performs a crypto-erase, so the reasoning goes like this:

1. Law enforcement from a country with laws not amenable against self-incrimination, such as the UK, or hostile adversaries, or an enraged wife - worst situation of the three - requires you to hand over password.
2. You hand over fake password that actually does a crypto-erasure.
3. Adversary looks into device and it presents as empty. …

adversaries adversary crypto device enforcement fake law law enforcement laws password privacy wife

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Computer and Forensics Investigator

@ ManTech | 221BQ - Cstmr Site,Springfield,VA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India