Forgot your password?
typodupeerror
Facebook

+ - Has anyone mirrored Facebook yet?

Submitted by gust5av
gust5av (1542231) writes "Facebook is always growing, and to view any content you have to agree to their terms. Before, this wasn't a problem for people refusing to play by Facebook's rules, but when companies start using Facebook as their official page, this might have professional consequences (job applications, etc).
Has anyone created a solution for this yet? It should be as simple as using a Facebook account to copy all (publicly available) information to another site, creating an up-to-date mirror. Of course Facebook is going to do everything in their power to bring it down, but it shouldn't be impossible, right?

How about: facemirror.org?"

Comment: Re:Who are you trying to protect from? (Score 1) 5

by gust5av (#33630484) Attached to: Distinguishing encrypted data from random data

My Idea is to make this system completely secure, no matter what resources are spent cracking it. At least in theory. ^^

Are you familiar with the cryptsetup program? When used (with or without LUKS) it doesn't copy anything and definitely doesn't write unencrypted data to the harddrive. Instead it creates a mapping, a new device in /dev/mapper/, which can be accessed to read and write to the file. This means that leaving traces of unencrypted data is not a problem.

Acually I did some more research. Check this out (read the comments):
http://it.slashdot.org/story/09/04/30/201222/Forensics-Tool-Finds-Headerless-Encrypted-Files
It's about the same thing I'm working on, and it seems that my tool will work. ^^

Comment: Re:How many random files do you have on your syste (Score 1) 5

by gust5av (#33625640) Attached to: Distinguishing encrypted data from random data

So, if the purpose is plausible deniablity -- why do you have the random files?

Let me give an example:
I have one (1) 100M file that looks random (could just as well be a Truecrypt volume). When I open it with my program I say that my data starts 20M into the file, and enter my password. Then `dumpe2fs` says that the filesystem size is 30M. This means that my data is written between Mbytes 20-50. I can make the filesystem larger and add files if I wish to, but everytime I unmount the volume I use resize2fs to shrink the fs as much as possible.
I also have a "secret" volume between Mbyte 60-80. But can I claim that this is just random data, that can be used to expand my first volume?

+ - Distinguishing encrypted data from random data 5

Submitted by gust5av
gust5av (1542231) writes "I'm working on a little script to provide _very_ simple and easy to use steganography. I'm using bash together with cryptsetup (without LUKS) and the plausable deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there's not?

If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?"

"Religion is something left over from the infancy of our intelligence, it will fade away as we adopt reason and science as our guidelines." -- Bertrand Russell

Working...