[Cryptography] Secure erasure

Peter Gutmann pgut001 at cs.auckland.ac.nz
Sat Sep 10 01:26:21 EDT 2016

John Denker <jsd at av8n.com> writes:

>I recommend:
>  Laura J. Heath,
>  "An Analysis of the Systemic Security Weaknesses of
>   the U.S. Navy Fleet Broadcasting System, 1967-1974,
>   as Exploited by CWO John Walker"

That's an excellent (I would say must-) read in any case, it documents what
happens when a technical security system designed in a vacuum comes into
contact with the real world.  And by that I'm describing not just the crypto
but also the process for obtaining and maintaining a clearance.  It's one of
the best security usability writeups I've ever read.


More information about the cryptography mailing list