Re: nuke password to delete luks header

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 01/14/2014 08:22 PM, .. ink .. wrote:
>  
> 
>     While I have not looked at it for some time, the last time I looked,
>     FAT did a create-at-end Strategy. This way the data "wanders" over
>     the partition towrds the end. ext2/3/4 will create files all over
>     the disk in the first place.
> 
> 
> My own tests have shown that with fat fs,files are not added randomly
> all over the disk and are added sequentially.Meaning,if the volume is
> used normally without exceeding a certain amount of disk space,the
> rest of the disk will remain untouched.

The whole hidden disk idea in TrueCrypt is based on this assumption,
and it works.

>From "Filesystem Forensic Analysis" by Brian Carrier
(ISBN 978-0-321-26817-4), page 224, FAT allocation algorithms:

"The OS gets to choose which allocation algorithm it uses when it allocates
the clusters. I tested Windows98 and XP, and it appeared that a next available
algorithm was being used in both. The next available algorithm searches for
the first available cluster starting from the previously allocated cluster."

I think this will be very similar for other FAT implementations.

Milan
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux