>>106133307we assume perfect drives (there are mitigations that are obvious, so I think you're retarded)
You're sperging out, but this is practically just like a keyfile.
Again, I think you are retarded, because obviously you use whatever other encryption you want, but this creates a very interesting scenario:
>you absolutely require physical control of two locations to get the data>there is no alternative, except catching you at the moment of use/creationUnlike a keyfile, this is perfect encryption.
I mean, given that it's perfect, it's wild nobody has done this.