-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Marc Schwartz schrieb: > (thing about filling the partition with random data before creating > crypted device) hi, sorry to bother you again. in a german computer magazine (namely c't) there's an article about luks and dm-crypt. they also say you have to fill the partition with random data (due to reasons we all know) but they do a little trick. they say /dev/zero is much faster than /dev/urandom (which should be true ;) ) so they whipe the first few m'bytes of the plan device with /dev/urandom (thats where the luks header will be written to), luksFormat the device, set it up and whipe the new encrypted device with zeros. so the zeros get encrypted and voila, random data on the partition. my question is: somebody who knows this technique now knows the plain "data" (or at least for a long time huge parts of it) could he get information about the master key he else wouldn't have? thank you for your time. Jan -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFEfN7CBpRI6A8tC0MRAukMAJwOkltaNQMfJXwSZh1U/hEoS7jnlwCgg9gL /LCKEUrCaNeJTTqZsx4e9c8= =IADm -----END PGP SIGNATURE----- --------------------------------------------------------------------- - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx