<SNIP really interesting idea>

Hi, I really like this idea. Another idea is: For the partition data in the boot
record on the dummy system, is it possible to have the first part of the
encrypted partition appear like a swap partition under the dummy system? I am
not sure if you would have to reformat that as a swap partition or not upon
booting the dummy system, but I was trying to think of a way to make the dummy
system overwrite a section of the encrypted partition, hopefully making it so
that the encrypted partition is trashed. 

Then setup the dummy system with a root login with password "god" or something
equally trivial. Is there some variant of this concept where the encrypted
partition could be trashed if attempts to access it by a non-aware user would be
possible? I am not sure of the details, but the concept is intriguing. You could
even put a /root/mypassword.txt file containing the password. I wonder if anyone
who mounts the partition on another machine, and sees that, would actually take
the bait and try booting the machine with the newly found goldmine of
information? Also, is it possible to trash an encrypted partition with only a
small amount of data over-writing the partition?

Regards,
//Andrew
-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-chat
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to