diff --git a/content/notes/loseable-keys-are-a-feature.md b/content/notes/loseable-keys-are-a-feature.md new file mode 100644 index 0000000..7605f89 --- /dev/null +++ b/content/notes/loseable-keys-are-a-feature.md @@ -0,0 +1,15 @@ +--- +title: "Lose-able keys are a feature" +date: 2024-09-12T20:30:14-04:00 +#syndicatedCopies: +# - title: 'The Fediverse' +# url: '' +# - title: 'Bluesky' +# url: '' +--- +In opsec, [duress ("rubber-hose") attacks are famously hard to address](https://xkcd.com/538/). Cryptographic keys that cannot be lost have poor protections against duress. + +Travelers can leave key fobs at home should they be accosted. A victim of a break-in can conveniently "lose" or smash a hardware key, erasing any encrypted data. Yes, I know about cold-boot attacks; I don't recommend at-risk people to leave things decrypted for long durations. I like the idea of spring-loaded key fobs that can't be left plugged in. + +People talking about key fob body implants don't usually plan for removing them in seconds with plausible deniability. +