I couldn't imagine a method more reliable than thermorectal cryptoanalysis, but you have done it with number 3). however, there is a weak point: if, during the process of universe destruction, an attacker are under constant observation by someone, his psi-function might eventually collapse somewhere he really don't want to be...
>> http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ > > Research grant ideas for 2010: > > 1) Replacing not only the computer, but victim's entire apartment, > with cardboard cutouts to intercept passwords, > > 2) Substituting victim's spouse with a conspicuously German lookalike, > > 3) Destroying all quantum-superposed universes in which the password > is *not* known to the attacker, in order to emerge in one where it is. > > 4) ??? > > 5) Profit. > > /mz > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
