Just in time for the evolution to cloud computing, boffins at the University of Washington have developed a tool that makes electronic data self-destruct automatically after a set period of time. The technique is designed to protect people against sensitive information that may linger on computer networks and later come back to …
Does that mean that Ethan Hunt is back in business
Sounds almost impossible
How to Kill This Tool
Very useful indee. Explain during discovery how your sensitive e-mails were "lost"...
...look at hard time at Club Fed (or the local equivalent).
This kind of crap only works for Dick Cheney or Junta Glitterati I am sorry to reveal.
Combined with a properly set up TOR network, this could work properly.
I encrypt my data, then send it to a stranger. I request my data from him, then decrypt it as needed. I never know who has my (encrypted) data, so once I shut my local system down, I have the key but not the lock, and someone (theoretically) unknown to me has the lock but not the key.
Now, instead of actual strangers, have several different datacenters, each spending most of their bandwidth confusing themselves about who they're talking to.
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- First Crack Man buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- First Fondle Reg journo battles Sydney iPHONE queue, FONDLES BIG 'UN
- TOR users become FBI's No.1 hacking target after legal power grab
- Vid Reg bloke zips through an iPHONE 6 queue from ZERO to 60 SECONDS