I was experimenting with TEA (Tiny Encryption Algorithm), and wrote
a nice little utility. But it occurs to me that this kind of thing
is useless unless all the back doors are closed. Specifically, one
should consider the worst case that "bad guys" can watergate the
computer at some inconvenient time, steal the hard drive, and turn it
over to a kernel expert, who attempts to recover the key.
So, being a newcommer to Linux, I thought I'd ask the experts:
1) What's the easiest/best way to ensure that no part of the executable
or data gets swapped to the hard-drive? (Suppose I'm not root.)
2) How can you make sure that disk buffers and keyboard buffers are
wiped clean before the program exits?
3) Is it possible to make completely certain that the physical area
on disk, where the original plain text resides, is wiped completely
clean?
4)How can one prevent evil user from scanning the physical memory
when the utility is resident and running?
5) Are there any other back doors that I've missed?
(There might be obvious answeres to these; but knowing nothing about
the file system, I'd rather not take any chances :)
Thanks in advance,
Robert