Just in time for the evolution to cloud computing, boffins at the University of Washington have developed a tool that makes electronic data self-destruct automatically after a set period of time. The technique is designed to protect people against sensitive information that may linger on computer networks and later come back to …
Does that mean that Ethan Hunt is back in business
Sounds almost impossible
How to Kill This Tool
Very useful indee. Explain during discovery how your sensitive e-mails were "lost"...
...look at hard time at Club Fed (or the local equivalent).
This kind of crap only works for Dick Cheney or Junta Glitterati I am sorry to reveal.
Combined with a properly set up TOR network, this could work properly.
I encrypt my data, then send it to a stranger. I request my data from him, then decrypt it as needed. I never know who has my (encrypted) data, so once I shut my local system down, I have the key but not the lock, and someone (theoretically) unknown to me has the lock but not the key.
Now, instead of actual strangers, have several different datacenters, each spending most of their bandwidth confusing themselves about who they're talking to.
- Crawling from the Wreckage Want a more fuel efficient car? Then redesign it – here's how
- Apple SILENCES Bose, YANKS headphones from stores
- Nobody wants to look at your boobs: Snapchat gets ads 'that interest you'
- TV Review Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
- Vid NASA eyeballs SOLAR HEAT BOMBS, MINI-TORNADOES and NANOFLARES on Sun