1
0
Fork 0
mirror of https://git.sr.ht/~seirdy/seirdy.one synced 2024-11-10 00:12:09 +00:00
seirdy.one/content/notes/loseable-keys-are-a-feature.md
2024-09-12 20:39:41 -04:00

945 B

title date syndicatedCopies
Lose-able keys are a feature 2024-09-12T20:30:14-04:00
title url
The Fediverse https://pleroma.envs.net/objects/5109b99d-e817-4f79-b9a4-8fe1293e3900
title url
Bluesky https://bsky.app/profile/seirdy.one/post/3l3yptx6w4l22

In opsec, duress ("rubber-hose") attacks are famously hard to address. Cryptographic keys that cannot be lost have poor protections against duress.

Travelers can leave key fobs at home should they be accosted. A victim of a break-in can conveniently "lose" or smash a hardware key, erasing any encrypted data. Yes, I know about cold-boot attacks; I don't recommend at-risk people to leave things decrypted for long durations. I like the idea of spring-loaded key fobs that can't be left plugged in.

People talking about key fob body implants don't usually plan for removing them in seconds with plausible deniability.