LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 12-27-2017, 05:15 AM   #1
rblampain
Senior Member
 
Registered: Aug 2004
Location: Western Australia
Distribution: Debian 9.2
Posts: 1,070

Rep: Reputation: 48
Not joking. Is powering down through a cron job the only solution?


Let's suppose I (and my accomplices of course) have a recipe to form a government that does not need politicians. Politicians automatically become my most lethal enemies when they become aware of my subversive website (nothing to do with version control like Subversion) and I might have good reasons to fear that, beside killing me after having asked the Chinese and the Russian experts the best way to do it in secret, they can coerce the police and the army and the secret services, even foreign politicians to seize my computers to silence me and my dissident and terrorist beloved friends.
Let's suppose I am using SED SSD with a KEK and a MEK to prevent that as, being the extremist I am, I think my drafts are more important than my own life. But they know that and after killing me despite the protection of my backup-loaded suicide vest, they seize my computers in a way that power remains "on" and all my files are readable to them due to the way self-encrypting drives work.
How can I solve this terrible problem other than as suggested above, with a cron job expecting an answer within a specified time, answer only known by one of those very dangerous dissident and terrorist supporters of governments-without-politicians, so I do not die in vain?

Thank you for your help.

Last edited by rblampain; 12-27-2017 at 05:29 AM.
 
Old 12-27-2017, 06:14 AM   #2
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 7,302
Blog Entries: 4

Rep: Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767
you been smoking something?

if you are really serious about this, explain the issue properly, not as a mr-robot-style short story.
 
Old 12-27-2017, 07:27 AM   #3
rblampain
Senior Member
 
Registered: Aug 2004
Location: Western Australia
Distribution: Debian 9.2
Posts: 1,070

Original Poster
Rep: Reputation: 48
The issue is obviously the fact that authorities (or audacious thieves convincingly disguised as some authority) can seize operational computers and maintain their "power on" status in order to later read files stored on SED SSD (or other SED drive) without having to provide a password and the solution to protect the files in such case appears to have a cron job asking regularly for a password or similar which has to be supplied within a certain time or the cron job turns power off (halt the system). The seized or stolen powered-off computers will then need to be given an unknown "key encryption key" (KEK) or only the useless encrypted data is available if the drive is put into another computer.
Presenting such issue in a conventional way always degenerate into interminable objections by those of the view one should not have anything to hide against those of the view hidding is a right and necessary, hence my scenario. May be others will not share your views.

Last edited by rblampain; 12-27-2017 at 07:47 AM.
 
Old 12-27-2017, 12:31 PM   #4
astrogeek
Moderator
 
Registered: Oct 2008
Distribution: Slackware [64]-X.{0|1|2|37|-current} ::12<=X<=14, FreeBSD_10{.0|.1|.2}
Posts: 4,595
Blog Entries: 6

Rep: Reputation: 2462Reputation: 2462Reputation: 2462Reputation: 2462Reputation: 2462Reputation: 2462Reputation: 2462Reputation: 2462Reputation: 2462Reputation: 2462Reputation: 2462
Please review the Site FAQ for guidance in asking clear and complete questions, which is the standard for asking questions in the technical fora.

Quote:
Presenting such issue in a conventional way always degenerate into interminable objections by those of the view one should not have anything to hide against those of the view hidding is a right and necessary...
Presenting it as you have with only a cloak-and-dagger novel type context, and no useful technical details, is much more likely to generate interminable tertiary discussion. As such your question does not rise to the level of a programming question and makes this thread more suitable for the General forum, where it will be moved.

If you need help with a data security problem, a well framed question in the Security forum would be more appropriate. If you need help with a specific programming problem, a well framed question in the Programming forum is the way to get help.

In the hypothetical scenario you describe, I do not think any sort of software solution would provide security. The only way to approach that problem would be to never power those systems up outside a physically secure environment, and never ever allow them to remain powered up when not attended by a person with complete control of that physical access - not even for a minute.

Good luck!
 
Old 12-27-2017, 12:51 PM   #5
wpeckham
Senior Member
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, Fedora, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, Vsido, tinycore, Q4OS
Posts: 2,446

Rep: Reputation: 1002Reputation: 1002Reputation: 1002Reputation: 1002Reputation: 1002Reputation: 1002Reputation: 1002Reputation: 1002
#1 why do your drives not have thermite self-distruct functions

#2 the only secure computer is in a locked room, under guard, with the guard monitored, on filtered power with no network and limited access based upon security level and need to know.

#3 The more secure option is to not use a computer and obfuscate your traces. We could teach you, but then you would be on our "list". You would not want that.
 
Old 12-27-2017, 03:09 PM   #6
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 7,302
Blog Entries: 4

Rep: Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767Reputation: 1767
usage habits:
switch your machine off when you don't use it.
of course that's not all, but usage habits go a long way, wrt that whole privacy/security thingy.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Cron job starts 6 hours late, rest of cron jobs work fine pieterhouwen Linux - Newbie 33 10-05-2015 01:38 PM
Cron Job Not Running - Looks Like Cron Tried Noble User Linux - Newbie 7 10-26-2014 11:26 AM
how to abort cron if the previous cron job not yet finished? Winanjaya Linux - Newbie 2 05-22-2012 07:44 PM
linux cron job duplicate job question cpthk Linux - Newbie 4 09-11-2009 09:52 PM
adding a perl script to cron.daily / cron.d to setup a cron job CrontabNewBIE Linux - Software 6 01-14-2008 09:16 AM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 06:47 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration