Header Clean
An idea providing consideration to users in countries with draconian laws regarding encryption, such as the UK.
This option allows the user to very quickly protect themselves from an attacker or to allow the user to attempt to defend themselves against RIPA.
The following request could be a separate portable .exe ( preferably with command line options for user scripting ) or built in to the new ciphershed TC replacement.
Function:
If provided as a portable version, the user can double click or run a script to execute "Header Clean". This tool will wipe the headers, encompassing backup headers of ALL attached hard drives and partitions including USB flash drives etc.
Wipe Pattern:
3x overwrite.
Two patterns of CSPRNG generated data and one last pattern of zero's. The last zero pattern is VERY important.
Benefits:
How it protects against brute force:
Put simply, the drives contain no header data for an adversary to attack. Immediate unbreakable protection.
How it protects against RIPA:
If there are no headers present then there is no reversible encryption. This is precisely why the last pass overwriting of zero's is so important. Zero is proof of no headers, random overwriting could be misinterpreted as a header.
With no headers there is little RIPA can do as the victim is able to provide any password they like. The victim has not refused to provide a password, so has complied with RIPA.
A user is able to freely provide any password, even the genuine one, as it may be discovered by other means. Either way, our user is protected by compliance.
For RIPA to fight this in law they would have to word the statute in such a way any file deletion was deemed illegal without prior permission from the state. Obviously an impossible restriction to enforce or even suggest.
A simple defence against any mistake:
If a user can envisage ever employing the "header clean" feature they should first create header backups and store them, encrypted, in a very safe and secure location.
Should a user mistakenly deploy the header cleaner they can easily restore their headers at a convenient time.
An added bonus feature of header clean:
Assuming my other request for a stand alone boot loader be adopted, then header clean can be used to remove the old headers from currently encrypted drives. After backing them up and also storing them on the stand alone boot loader obviously.
Arguments against:
Victim could be accused of intentional destruction of evidence.
This is only relevant if you knowingly destroy the headers when you are aware your hard drive is classed as evidence. Until the point you are arrested and your drive is held as evidence, you are free to use this tool.
You can also say you wiped your drives as you believed you were under attack from criminals or you mistakenly wiped them in the past.
There are idiots who will wipe their drives, we don't want the forum filled with complaints:
This is true and something the previous developers allowed to restrain TC's development. If we mistakenly follow this principle of only allowing progress to the lowest skilled member of the public, we will never enjoy many benefits which are already possible.
All the above is not trying to protect criminals, just the vulnerable.