Re: How about deniability? (read: http://www.zdnet.co.uk/print/?TYPE=story&AT=39269746-39020330t-10000025c)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have all my disks completly encrypted. The boot partition is on a
usb-stick. There is a section on this in the loop-aes.readme.

Antonio Di Salvo wrote:
> truecrypt offers a feature called hidden volume that makes use of a
> nested encrypted file system. If forced, you can reveal the password
> of the outer volume, while the one that really holds sensitive data is
> hidden and cannot be distinguished from random data.
> they give an explanation at this url:
> http://www.truecrypt.org/hiddenvolume.php
> 
> I'm not aware if loop-aes provides something similar, so I cannot
> answer you. However, I think not (IMHO). If someone know if it is
> possibile to have completely random-looking data on the disk with root
> partition encryption, please let me know.
> 
> Byez!
> 
> PS: sorry for the english!
> 
> On 5/19/06, Gregor Zattler <telegraph@xxxxxxx> wrote:
> 
>> Hi,
>>
>> "Government to force handover of encryption keys"
>> http://www.zdnet.co.uk/print/?TYPE=story&AT=39269746-39020330t-10000025c
>>
>> does loop-aes provide some kind of deniability?
>>
>> Does any other free crypto system?
>>
>> Ciao, Gregor
>> -- 
>>  -... --- .-. . -.. ..--.. ...-.-
>>
>> -
>> Linux-crypto:  cryptography in and on the Linux system
>> Archive:       http://mail.nl.linux.org/linux-crypto/
>>
>>
> 
> -
> Linux-crypto:  cryptography in and on the Linux system
> Archive:       http://mail.nl.linux.org/linux-crypto/
> 
> 

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux