|
February 12, 2014, 08:00:48 PM Last edit: February 12, 2014, 08:13:35 PM by etotheipi |
|
Indeed, when you encrypt your wallet, Armory attempts to replace the unencrypted keys with the encrypted keys, in-place, hoping that the OS will overwrite the originals on disk. Unfortunately, this is not guaranteed, and it's probably a PhD-level project to figure out how to guarantee overwrite/delete of such data. But it's the best we can do when you start with an unencrypted wallet on disk, and any subsequent copies to other places/devices are guaranteed not to have the unencrypted data. An attacker would need low-level access to your disk to look for sectors that were marked deleted but not actually overwritten (luckily, there's a chance that Armory's operations do work, but it's far from guaranteed).
I guess the best thing to do in this situation is to encrypt the HDD of your offline computer so that the initial restore will still be encrypted on disk (even though Armory is doing it unencrypted). Or restore to a RAM disk, etc, that never touches the harddrive. Then encrypt the wallet and copy the encrypted version to your harddrive. Definitely not the most convenient but probably the best you can do without us fixing this...
|