Systems and methods for controlling access to data on a computer with a
secure boot process can provide a highly efficient mechanism for
preventing future access to encrypted digital resources. This may be
advantageous in a range of scenarios, for example where a computer is
sold and assurance is desired that no stray private data remains on the
hard disk. Data resources, for example all data associated with one or
more particular hard disk partitions, may be encrypted. The decryption
key may be available through a secure boot process. By erasing, altering,
or otherwise disabling a secret, such as a decryption key or a process
that obtains a decryption key, the data formerly accessible using such
secret becomes inaccessible.