Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Has anyone mirrored Facebook yet?

gust5av writes: Facebook is always growing, and to view any content you have to agree to their terms. Before, this wasn't a problem for people refusing to play by Facebook's rules, but when companies start using Facebook as their official page, this might have professional consequences (job applications, etc).
Has anyone created a solution for this yet? It should be as simple as using a Facebook account to copy all (publicly available) information to another site, creating an up-to-date mirror. Of course Facebook is going to do everything in their power to bring it down, but it shouldn't be impossible, right?

How about: facemirror.org?

Comment Re:Who are you trying to protect from? (Score 1) 5

My Idea is to make this system completely secure, no matter what resources are spent cracking it. At least in theory. ^^

Are you familiar with the cryptsetup program? When used (with or without LUKS) it doesn't copy anything and definitely doesn't write unencrypted data to the harddrive. Instead it creates a mapping, a new device in /dev/mapper/, which can be accessed to read and write to the file. This means that leaving traces of unencrypted data is not a problem.

Acually I did some more research. Check this out (read the comments):
It's about the same thing I'm working on, and it seems that my tool will work. ^^

Comment Re:How many random files do you have on your syste (Score 1) 5

So, if the purpose is plausible deniablity -- why do you have the random files?

Let me give an example:
I have one (1) 100M file that looks random (could just as well be a Truecrypt volume). When I open it with my program I say that my data starts 20M into the file, and enter my password. Then `dumpe2fs` says that the filesystem size is 30M. This means that my data is written between Mbytes 20-50. I can make the filesystem larger and add files if I wish to, but everytime I unmount the volume I use resize2fs to shrink the fs as much as possible.
I also have a "secret" volume between Mbyte 60-80. But can I claim that this is just random data, that can be used to expand my first volume?

Submission + - Distinguishing encrypted data from random data 5

gust5av writes: I'm working on a little script to provide _very_ simple and easy to use steganography. I'm using bash together with cryptsetup (without LUKS) and the plausable deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there's not?

If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?

Slashdot Top Deals

If a thing's worth having, it's worth cheating for. -- W.C. Fields