I have all my disks completly encrypted. The boot partition is on a usb-stick. There is a section on this in the loop-aes.readme. Antonio Di Salvo wrote: > truecrypt offers a feature called hidden volume that makes use of a > nested encrypted file system. If forced, you can reveal the password > of the outer volume, while the one that really holds sensitive data is > hidden and cannot be distinguished from random data. > they give an explanation at this url: > http://www.truecrypt.org/hiddenvolume.php > > I'm not aware if loop-aes provides something similar, so I cannot > answer you. However, I think not (IMHO). If someone know if it is > possibile to have completely random-looking data on the disk with root > partition encryption, please let me know. > > Byez! > > PS: sorry for the english! > > On 5/19/06, Gregor Zattler <telegraph@xxxxxxx> wrote: > >> Hi, >> >> "Government to force handover of encryption keys" >> http://www.zdnet.co.uk/print/?TYPE=story&AT=39269746-39020330t-10000025c >> >> does loop-aes provide some kind of deniability? >> >> Does any other free crypto system? >> >> Ciao, Gregor >> -- >> -... --- .-. . -.. ..--.. ...-.- >> >> - >> Linux-crypto: cryptography in and on the Linux system >> Archive: http://mail.nl.linux.org/linux-crypto/ >> >> > > - > Linux-crypto: cryptography in and on the Linux system > Archive: http://mail.nl.linux.org/linux-crypto/ > > - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/