Making Data Unvanish 34
sertsa writes "Earlier this year a group of researchers at the University of Washington came up with a scheme to use peer-to-peer networks to store and, ultimately, to forget the keys for encrypted messages, causing them to 'Vanish.' Now a group from researchers from UT Austin, Princeton, and the University of Michigan has come up with a way to break this approach, by making a single computer appear to be many nodes on the p2p network. 'In our experiments with Unvanish, we have shown that it is possible to make Vanish messages reappear long after they should have disappeared nearly 100 percent of the time...'"
Orange book... (Score:3, Informative)
Orange book:
A-
You are are a single communication construct. No one outside the circle of trust has any idea what is communicated.
B-
You are in a network (circle) of trust. moving data to each other is logged, and allowed/censored.
C-
A typical LAN with verifiable security.
D-
The internet, a net work of networks. Data can 'vanish', as a function of time/money spent on keeping the data stored.
Read the data security handbook summarized:
http://en.wikipedia.org/wiki/Trusted_Computer_System_Evaluation_Criteria [wikipedia.org]