Just in time for the evolution to cloud computing, boffins at the University of Washington have developed a tool that makes electronic data self-destruct automatically after a set period of time. The technique is designed to protect people against sensitive information that may linger on computer networks and later come back to …
Does that mean that Ethan Hunt is back in business
Sounds almost impossible
How to Kill This Tool
Very useful indee. Explain during discovery how your sensitive e-mails were "lost"...
...look at hard time at Club Fed (or the local equivalent).
This kind of crap only works for Dick Cheney or Junta Glitterati I am sorry to reveal.
Combined with a properly set up TOR network, this could work properly.
I encrypt my data, then send it to a stranger. I request my data from him, then decrypt it as needed. I never know who has my (encrypted) data, so once I shut my local system down, I have the key but not the lock, and someone (theoretically) unknown to me has the lock but not the key.
Now, instead of actual strangers, have several different datacenters, each spending most of their bandwidth confusing themselves about who they're talking to.
- Does Apple's iOS 7 make you physically SICK? Try swallowing version 7.1
- Fee fie Firefox: Mozilla's lawyers probe Dell over browser install charge
- Pics Indestructible Death Stars blow up planets with glowing KILL RAY
- Video Snowden: You can't trust SPOOKS with your DATA
- Hands on Satisfy my scroll: El Reg gets claws on Windows 8.1 spring update