truecrypt offers a feature called hidden volume that makes use of a nested encrypted file system. If forced, you can reveal the password of the outer volume, while the one that really holds sensitive data is hidden and cannot be distinguished from random data. they give an explanation at this url: http://www.truecrypt.org/hiddenvolume.php I'm not aware if loop-aes provides something similar, so I cannot answer you. However, I think not (IMHO). If someone know if it is possibile to have completely random-looking data on the disk with root partition encryption, please let me know. Byez! PS: sorry for the english! On 5/19/06, Gregor Zattler <telegraph@xxxxxxx> wrote:
Hi, "Government to force handover of encryption keys" http://www.zdnet.co.uk/print/?TYPE=story&AT=39269746-39020330t-10000025c does loop-aes provide some kind of deniability? Does any other free crypto system? Ciao, Gregor -- -... --- .-. . -.. ..--.. ...-.- - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/
- Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/