And my point that it is more secure to remove information from a system than to keep it in the system encoded
Is drk actually doing this? I asked for a detailed description earlier from you and it didn't seem that you understood how drk worked enough to make a statement such as this with real confidence.