[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Opiated file systems
On Mon, 15 Jul 1996, Mark O. Aldrich wrote:
> On Mon, 15 Jul 1996, Deranged Mutant wrote:
>
> something that I've seen approached in any reasonable manner. Probably
> because it's just too damn hard and the notion of "real looking" data is a
> little hard to define scientifically. A combination stego/crypto solution
> may be more appropriate, but close examination of the box is going to
> reveal what happened (assuming the desired solution must withstand some
> protracted forensics?). The nuke_the_data or nuke_the_keys solutions are
> easier to do, and have been implemented in several situations of which I
> am aware.
How about simply stegging your crypt files into some other data type,
instead of decrypting, when someone attempts to use the duress key. Then
scrub the code that accomplished this and pray.
Just a thought...