it's an awesome concept, but for one flaw in my opinion.<br><br><br><p>"Instead, we leverage an unusual storage media in a novel way:
namely, global-scale peer-to-peer networks. Vanish creates a secret
key to encrypt a user's data item (such as an email), breaks the key
into many pieces and then sprinkles the pieces across the P2P network.
As machines constantly join and leave the P2P network, the pieces of
the key gradually disappear. By the time the hacker or someone with a
subpoena actually tries to obtain access to the message, the pieces of
the key will have permanently disappeared.
</p><p>
Our Vanish prototype uses the <a href="http://azureus.sourceforge.net/index.php">Vuze Bittorrent</a>
Distributed Hash Table as the underlying P2P network.
Our prototype by default supports data timeouts of
<a href="http://vanish.cs.washington.edu/faq.html#How_much_flexibility">8--9 hours</a>, though longer timeouts are possible. "<br></p><p><br></p><p><br></p><p>This seems a very unreliable method of timing the key destruction. Also what happens if you can only obtain 50% of the key?</p>
<p><br></p><p>It's clever, but there's still work to be done.<br></p><br><br><div class="gmail_quote">On Fri, Aug 14, 2009 at 1:06 AM, Rick Moynihan <span dir="ltr"><<a href="mailto:rick.moynihan@gmail.com">rick.moynihan@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">2009/8/13 Robert Ladyman <<a href="mailto:it@file-away.co.uk">it@file-away.co.uk</a>>:<br>
<div class="im">> Interesting approach.<br>
><br>
> <a href="http://news.bbc.co.uk/1/hi/technology/8197449.stm" target="_blank">http://news.bbc.co.uk/1/hi/technology/8197449.stm</a><br>
<br>
</div>It's pretty awesome isn't it? I ran into it sometime last week.<br>
<br>
Not sure how practical it is, but you can find more details on<br>
achieving the previously impossible here:<br>
<br>
<a href="http://vanish.cs.washington.edu/" target="_blank">http://vanish.cs.washington.edu/</a><br>
<font color="#888888"><br>
R.<br>
</font><div><div></div><div class="h5"><br>
_______________________________________________<br>
dundee GNU/Linux Users Group mailing list<br>
<a href="mailto:dundee@lists.lug.org.uk">dundee@lists.lug.org.uk</a> <a href="http://dundeelug.org.uk" target="_blank">http://dundeelug.org.uk</a><br>
<a href="https://mailman.lug.org.uk/mailman/listinfo/dundee" target="_blank">https://mailman.lug.org.uk/mailman/listinfo/dundee</a><br>
Chat on IRC, #tlug on <a href="http://irc.lug.org.uk" target="_blank">irc.lug.org.uk</a><br>
</div></div></blockquote></div><br><br clear="all"><br>-- <br><br><br>Nick Walker<br>Vice President : The Linux Society<br>UAD Ethical Hacker<br>