StegFS has a nice concept of hiding data in the free filesystem areas. Each data-set is replicated multiple times in case the free space gets overwritten by the filesystem. [http://spar.isi.jhu.edu/~chris/presentations/rubberhose.pdf] While this concept may work for small files, it won't work for a large, complete partition you want to hide. What I want (and what TrueCrypt has) is an encrypted filesystem with plausible deniability. TrueCrypt allows to set up an encrypted volume like any other encrypted filesystem. Plausible deniability comes with setting up hidden volumes inside an encrypted volume. If only the outer volume is mounted you won't see the inside volume and if you write to it, it will even overwrite the hidden volume. (the outer volume is not aware of the hidden volume, the space the hidden volume occupies is treated as free space). Summed up, TrueCrypt is exactly what I want: A strong cryptographic filesystem with plausible deniability. Unfortunately, there's currently no way to set up a TrueCrypt filesystem on GNU/Linux systems, though it's definitely planned and should be in the next release. I'm looking forward to understand the internals of the TrueCrypt code and maybe port/implement something on my own. greets, Stefan On Wed, 29 Mar 2006 14:03:22 +0100 Dick Middleton <...> wrote: > Stefan Schönleitner wrote: > > Hi, > > > > is it possible to add a self-destruct passphrase to the encrypted > > filesystem ? > > Are there any intentions to implement a self-destruct solution ? > > Isn't this a job for stegFS? Plausible deniability. > > http://www.mcdonald.org.uk/StegFS/ > > Unfortunately it hasn't been updated for 2.4 let alone 2.6. However I > think it's a better solution than your proposal because of the > difficulties already mentioned in the responses to this thread. > > Dick --------------------------------------------------------------------- - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx