Hi. But this goes IMO more in the plausible denyability direction, doesn't it? An attacker would still be not able to read what was written. And for most applications it should be extremely difficult or even impossible to make any conclusions,.. because of fragmentation... etc. pp. Another issue is of course when you have corrupted programs in the system.... but then you're screwed anyway,... and there are usually much easier to implement hidden channels.... (but this argument shouldn't count as I always say myself ;) ). Cheers, Chris.
Attachment:
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt