Today the UK Home Office announced the public consultation on the Code of Practice of Part 3 of RIPA. This is the first stage of the process by which it can be brought into force. Part III of RIPA is the "policeman-say-gimme-all-your-keys-or-go-to-jail-(and-don't-tell-anybody)" law passed 6 years ago but not yet brought into force.
With the advent of GAK in the UK looking more and more likely, I am ramping up the m-o-o-t project ( http://www.m-o-o-t.org , but the website is woefully out-of-date and the final form of the project may be rather different to that described therein), which has been dormant for some time. m-o-o-t's goal is to provide even the dumbest luser with the tools to avoid and evade demands for keys in such a way that it is very hard for them to mess up and to anything insecurely. This will be either for free or at very low cost (might do something with a USB stick which the user would have to buy, but not from us - software will be free). In a preliminary search for alternatives, I am seeking an answer to this question. I know very little about Windows beyond that many people use it and that source is not available, so be gentle with me please. In an attempt to partially secure Windows for temporary use, ie when it's being temporarily used in "secure mode", and to prevent data being stored in softwarekeylogger, temp and swap files, would something like the following be possible? Bot from CD, create a memory FS, union mount it to the main windows fat-32 FS, with the fat-32 fs mounted read-only, boot Windows? That way any changes to the files would be wiped out when the power was switched off, and the fat-32 fs would remain untouched. Mount a steganographic FS read/write on eg a USB key (or a different partition) on / with a hard-to-guess name. Secret files should be saved to this fs. Thanks, -- Peter Fairbrother [EMAIL PROTECTED] http://www.m-o-o-t.org Moderated mailing list: [EMAIL PROTECTED] Notification of release: blank email to [EMAIL PROTECTED] --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
