From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.saout.de ([127.0.0.1]) by localhost (mail.saout.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gu0LpDJTuG5E for ; Mon, 6 Jan 2014 22:40:01 +0100 (CET) Received: from moutng.kundenserver.de (moutng.kundenserver.de [212.227.17.9]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by mail.saout.de (Postfix) with ESMTPS for ; Mon, 6 Jan 2014 22:40:01 +0100 (CET) Date: Mon, 6 Jan 2014 22:39:59 +0100 From: Heinz Diehl Message-ID: <20140106213959.GA7400@fancy-poultry.org> References: <52CB19C4.9070404@riseup.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <52CB19C4.9070404@riseup.net> Subject: Re: [dm-crypt] nuke password to delete luks header List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de On 06.01.2014, R3s1stanc3 wrote: > If you got the possibility to access your computer for a few seconds, > before an attacker does, you simply could enter your nuke password and > delete the luks header. You maybe could just switch off the power?! Depends on the situation..