Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Who are you trying to protect from? (Score 1) 5

My Idea is to make this system completely secure, no matter what resources are spent cracking it. At least in theory. ^^

Are you familiar with the cryptsetup program? When used (with or without LUKS) it doesn't copy anything and definitely doesn't write unencrypted data to the harddrive. Instead it creates a mapping, a new device in /dev/mapper/, which can be accessed to read and write to the file. This means that leaving traces of unencrypted data is not a problem.

Acually I did some more research. Check this out (read the comments):
http://it.slashdot.org/story/09/04/30/201222/Forensics-Tool-Finds-Headerless-Encrypted-Files
It's about the same thing I'm working on, and it seems that my tool will work. ^^

Comment Re:How many random files do you have on your syste (Score 1) 5

So, if the purpose is plausible deniablity -- why do you have the random files?

Let me give an example:
I have one (1) 100M file that looks random (could just as well be a Truecrypt volume). When I open it with my program I say that my data starts 20M into the file, and enter my password. Then `dumpe2fs` says that the filesystem size is 30M. This means that my data is written between Mbytes 20-50. I can make the filesystem larger and add files if I wish to, but everytime I unmount the volume I use resize2fs to shrink the fs as much as possible.
I also have a "secret" volume between Mbyte 60-80. But can I claim that this is just random data, that can be used to expand my first volume?

Submission + - Distinguishing encrypted data from random data 5

gust5av writes: I'm working on a little script to provide _very_ simple and easy to use steganography. I'm using bash together with cryptsetup (without LUKS) and the plausable deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there's not?

If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?

Slashdot Top Deals

"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs

Working...