Become a fan of Slashdot on Facebook


Forgot your password?
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Submission + - Has anyone mirrored Facebook yet?

gust5av writes: Facebook is always growing, and to view any content you have to agree to their terms. Before, this wasn't a problem for people refusing to play by Facebook's rules, but when companies start using Facebook as their official page, this might have professional consequences (job applications, etc).
Has anyone created a solution for this yet? It should be as simple as using a Facebook account to copy all (publicly available) information to another site, creating an up-to-date mirror. Of course Facebook is going to do everything in their power to bring it down, but it shouldn't be impossible, right?

How about:

Comment Re:Who are you trying to protect from? (Score 1) 5

My Idea is to make this system completely secure, no matter what resources are spent cracking it. At least in theory. ^^

Are you familiar with the cryptsetup program? When used (with or without LUKS) it doesn't copy anything and definitely doesn't write unencrypted data to the harddrive. Instead it creates a mapping, a new device in /dev/mapper/, which can be accessed to read and write to the file. This means that leaving traces of unencrypted data is not a problem.

Acually I did some more research. Check this out (read the comments):
It's about the same thing I'm working on, and it seems that my tool will work. ^^

Comment Re:How many random files do you have on your syste (Score 1) 5

So, if the purpose is plausible deniablity -- why do you have the random files?

Let me give an example:
I have one (1) 100M file that looks random (could just as well be a Truecrypt volume). When I open it with my program I say that my data starts 20M into the file, and enter my password. Then `dumpe2fs` says that the filesystem size is 30M. This means that my data is written between Mbytes 20-50. I can make the filesystem larger and add files if I wish to, but everytime I unmount the volume I use resize2fs to shrink the fs as much as possible.
I also have a "secret" volume between Mbyte 60-80. But can I claim that this is just random data, that can be used to expand my first volume?

Submission + - Distinguishing encrypted data from random data 5

gust5av writes: I'm working on a little script to provide _very_ simple and easy to use steganography. I'm using bash together with cryptsetup (without LUKS) and the plausable deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there's not?

If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?

Slashdot Top Deals

Some of my readers ask me what a "Serial Port" is. The answer is: I don't know. Is it some kind of wine you have with breakfast?