Nov. 17, 2023, 1:28 a.m. | /u/Redvolition

Privacy & Freedom in the Information Age

For example, several [Aegis]( and [Kingston]( hardware have a self-destruct PIN or password that performs a crypto-erase, so the reasoning goes like this:

1. Law enforcement from a country with laws not amenable against self-incrimination, such as the UK, or hostile adversaries, or an enraged wife - worst situation of the three - requires you to hand over password.
2. You hand over fake password that actually does a crypto-erasure.
3. Adversary looks into device and it presents as empty. …

adversaries adversary crypto device enforcement fake law law enforcement laws password privacy wife

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff Security Engineering(Cloud Security)

@ Coupang | Seoul, South Korea

Consultant en Gestion de Crise Cyber et Continuité d'Activité H/F

@ Hifield | Sèvres, France

Forensic Service Director

@ PwC | Calgary - 111-5th Avenue Southwest

Information Security Analyst

@ Guidewire Software | India - Bengaluru

Cyber Security Engineer III-IV (Splunk Content Developer/ES Search head Admin)

@ Navy Federal Credit Union | Vienna, VA, United States