Encrypted Dapper filesystems?

mitch epling m_epling at comcast.net
Sat Jun 10 18:53:39 UTC 2006


 hey with bush , the nsa , wire tapping  the att and phone companies   i
dont blame him a bit
Alan McKinnon wrote:
> On Saturday 10 June 2006 10:21, Daniel Carrera wrote:
>   
>> True Crypt makes an encrypted volume that can be mounted as any
>> disk. What True Crypt provides and the other doesn't is plausible
>> deniability:
>>
>> * The volume is indistinguishable from random data.
>> * The file on the filesystem that represents the TC module can have
>> any extension (.iso, .png, .raw) or no extension at all. TC leaves
>> no trace when it accesses this file (the timestamp doesn't change).
>> * True Crypt volumes do not have a "signature" and they are not
>> listed on the partition table. Again, it looks like random data
>> (e.g. left over from when the disk was manufactured).
>> * Hidden volumes. It may happen that the attacker (e.g. FBI, the
>> mafia) forces you to give up your password (e.g. through a court
>> order, or a gun). You can have a hidden TC volume inside a TC
>> volume. You put some medium-secrecy files in the outside volume and
>> the top-secret files in the second one. You give the attacker the
>> password for the outer volume and they never find out that there is
>> another hidden volume. It is not possible to prove the existence of
>> the hidden volume
>>     
>
> Wow. If you need that, you have some hard-ball enemies in this life.
>
> I also have a spare tinfoil hat for sale if you are interested. :-)
>
> alan
>
>   

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20060610/bb717b8c/attachment.html>


More information about the ubuntu-users mailing list