Responding to ".. ink .." <mhogomchungu@xxxxxxxxx> : > Two differences i can think of are: > 3. luks doesnt support hidden volumes. > It does, in a way. Create a loop file (or an existing partition). fill it with random data (important!) cryptsetup luksFormat it cryptsetup luksOpen it Format the crypted device with FAT32 (important!) Then, use loop with a high offset, e.g. more than half of the disk, create a plain cryptsetup losetup -o 10000000 device cryptsetup create loop secretname format it with any filesystem, copy your very secret documents in it, close this partition. By doing this, anyone without the knowledge of the offset + the password won't be able to prove that you have datas hidden. Warning, if you write more data in the first luks device than the offset choosen, you destroy data (but in some case, you may want it). My 2 cents. Envoyé avec Inmano, ma messagerie renversante et gratuite : http://www.inmano.com _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt