<SNIP really interesting idea> Hi, I really like this idea. Another idea is: For the partition data in the boot record on the dummy system, is it possible to have the first part of the encrypted partition appear like a swap partition under the dummy system? I am not sure if you would have to reformat that as a swap partition or not upon booting the dummy system, but I was trying to think of a way to make the dummy system overwrite a section of the encrypted partition, hopefully making it so that the encrypted partition is trashed.
Then setup the dummy system with a root login with password "god" or something equally trivial. Is there some variant of this concept where the encrypted partition could be trashed if attempts to access it by a non-aware user would be possible? I am not sure of the details, but the concept is intriguing. You could even put a /root/mypassword.txt file containing the password. I wonder if anyone who mounts the partition on another machine, and sees that, would actually take the bait and try booting the machine with the newly found goldmine of information? Also, is it possible to trash an encrypted partition with only a small amount of data over-writing the partition? Regards, //Andrew -- http://linuxfromscratch.org/mailman/listinfo/lfs-chat FAQ: http://www.linuxfromscratch.org/faq/ Unsubscribe: See the above information page
