Forgot your password?
typodupeerror
Facebook

+ - Has anyone mirrored Facebook yet?

Submitted by gust5av
gust5av (1542231) writes "Facebook is always growing, and to view any content you have to agree to their terms. Before, this wasn't a problem for people refusing to play by Facebook's rules, but when companies start using Facebook as their official page, this might have professional consequences (job applications, etc).
Has anyone created a solution for this yet? It should be as simple as using a Facebook account to copy all (publicly available) information to another site, creating an up-to-date mirror. Of course Facebook is going to do everything in their power to bring it down, but it shouldn't be impossible, right?

How about: facemirror.org?"

Comment: Re:Who are you trying to protect from? (Score 1) 5

by gust5av (#33630484) Attached to: Distinguishing encrypted data from random data

My Idea is to make this system completely secure, no matter what resources are spent cracking it. At least in theory. ^^

Are you familiar with the cryptsetup program? When used (with or without LUKS) it doesn't copy anything and definitely doesn't write unencrypted data to the harddrive. Instead it creates a mapping, a new device in /dev/mapper/, which can be accessed to read and write to the file. This means that leaving traces of unencrypted data is not a problem.

Acually I did some more research. Check this out (read the comments):
http://it.slashdot.org/story/09/04/30/201222/Forensics-Tool-Finds-Headerless-Encrypted-Files
It's about the same thing I'm working on, and it seems that my tool will work. ^^

Comment: Re:How many random files do you have on your syste (Score 1) 5

by gust5av (#33625640) Attached to: Distinguishing encrypted data from random data

So, if the purpose is plausible deniablity -- why do you have the random files?

Let me give an example:
I have one (1) 100M file that looks random (could just as well be a Truecrypt volume). When I open it with my program I say that my data starts 20M into the file, and enter my password. Then `dumpe2fs` says that the filesystem size is 30M. This means that my data is written between Mbytes 20-50. I can make the filesystem larger and add files if I wish to, but everytime I unmount the volume I use resize2fs to shrink the fs as much as possible.
I also have a "secret" volume between Mbyte 60-80. But can I claim that this is just random data, that can be used to expand my first volume?

+ - Distinguishing encrypted data from random data 5

Submitted by gust5av
gust5av (1542231) writes "I'm working on a little script to provide _very_ simple and easy to use steganography. I'm using bash together with cryptsetup (without LUKS) and the plausable deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there's not?

If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?"

I am here by the will of the people and I won't leave until I get my raincoat back. - a slogan of the anarchists in Richard Kadrey's "Metrophage"

Working...