Encrypted Dapper filesystems?
Alan McKinnon
alan at linuxholdings.co.za
Sat Jun 10 14:31:50 UTC 2006
On Saturday 10 June 2006 10:21, Daniel Carrera wrote:
> True Crypt makes an encrypted volume that can be mounted as any
> disk. What True Crypt provides and the other doesn't is plausible
> deniability:
>
> * The volume is indistinguishable from random data.
> * The file on the filesystem that represents the TC module can have
> any extension (.iso, .png, .raw) or no extension at all. TC leaves
> no trace when it accesses this file (the timestamp doesn't change).
> * True Crypt volumes do not have a "signature" and they are not
> listed on the partition table. Again, it looks like random data
> (e.g. left over from when the disk was manufactured).
> * Hidden volumes. It may happen that the attacker (e.g. FBI, the
> mafia) forces you to give up your password (e.g. through a court
> order, or a gun). You can have a hidden TC volume inside a TC
> volume. You put some medium-secrecy files in the outside volume and
> the top-secret files in the second one. You give the attacker the
> password for the outer volume and they never find out that there is
> another hidden volume. It is not possible to prove the existence of
> the hidden volume
Wow. If you need that, you have some hard-ball enemies in this life.
I also have a spare tinfoil hat for sale if you are interested. :-)
alan
--
If only me, you and dead people understand hex,
how many people understand hex?
Alan McKinnon
alan at linuxholdings dot co dot za
+27 82, double three seven, one nine three five
More information about the ubuntu-users
mailing list