


overwritten for instance with Gutmann's methods). the key has to be stored in a secure, inaccessible area so it has to be removed from the PC every time (and its disk storage area securely deleted, e.g. With one-time pad, you can't use the same key more than one time, EVER. I can't see where you would attach that to a PC. True random noise can be achieved with VERY few sources, one is radioactive decay. With one-time pad, you need a TRUE entropy source to build a key, something that certainly a PC doesn't have certainly Windows, with its absolutely pathetic random number generation, is as removed from true entropy as it gets. XOR, on the other hand, is one of the weakest algorithms in existence and it takes less than a few seconds for a PC to break it. One-time pad is unbreakable encryption, but it can NOT be achieved on a regular PC, nor it is usable for practical purposes. And the fact they can't even tell the difference between true one-time pad and XOR is just ridiculous.

Sentence like "XorIt uses the XOR encryption method (also known as Vernam encryption) that can have keys the same size as the file to be encrypted" would be funny if these people did not seriously mean it.
