[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Opiated file systems
-----BEGIN PGP SIGNED MESSAGE-----
On Mon, 15 Jul 1996, Mark O. Aldrich wrote:
> Date: Mon, 15 Jul 1996 17:43:28 -0400 (EDT)
> From: "Mark O. Aldrich" <[email protected]>
> To: Deranged Mutant <[email protected]>
> Cc: Adam Back <[email protected]>, [email protected]
> Subject: Re: Opiated file systems
>
[Usefull stuff >/dev/null]
>
> The payload of getting false data out of a crypto algorithm, such that the
> data looks "real", when a duress key is input to the algorithm is not
> something that I've seen approached in any reasonable manner. Probably
> because it's just too damn hard and the notion of "real looking" data is a
> little hard to define scientifically. A combination stego/crypto solution
> may be more appropriate, but close examination of the box is going to
> reveal what happened (assuming the desired solution must withstand some
> protracted forensics?). The nuke_the_data or nuke_the_keys solutions are
> easier to do, and have been implemented in several situations of which I
> am aware.
>
But, on the other hand, it wouldn't be to hard to have the user set both
keys (yeah, so that didn't actually say anything, so what...), and then do
an every-other-byte type thing (although that would be slow... every other
block would be more efficient), and have 2 EFS's in one file, and make it
so that on the "duress" one the extra space appears to be "free".
One could make it a real file system, and add a fake disk error to prevent
over-writing of the "non-duress" filesystem.
>
> -------------------------------------------------------------------------
> |Just as the strength of the Internet is |Mark Aldrich |
> |chaos, so the strength of our liberty |GRCI INFOSEC Engineering |
> |depends upon the chaos and cacophony of |[email protected] |
> |the unfettered speech the First Amendment|[email protected] |
> |protects - District Judge Stewart Dalzell| |
> |_______________________________________________________________________|
> |The author is PGP Empowered. Public key at: finger [email protected] |
> | The opinions expressed herein are strictly those of the author |
> | and my employer gets no credit for them whatsoever. |
> -------------------------------------------------------------------------
>
This will sound odd, but did you know that "dockmaster" was the name of
the NSA's first unclassified computer? just wondering.... ;)
--Deviant
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQEVAwUBMetbfTAJap8fyDMVAQGN7Af+Jck2zofxtJOBLuceEhGmaZwoodxGHITb
PrdLwsrYVdWbyzhtmCy9iDm0cMh0BW6dRGXDQWml4Ed0ObAPBwQz4wwpbS+4OOBS
VSsTQ+A5JctbxeaA24XPPCbVOLrCCFaWiNZacSft/hUPDn4etYPKwtVDFfFsKtWF
VohL28TyLAskNUFarKKr1YFVAlZ632XZy9xEDXnNi7lDwj5cSHtCL89Kt0F8qSiq
6Qz+cfWmwpx4Pv/CyenTUHu+Q6orgxSGIY7hBGywcUzm4lRKmOJrzFjqjM3Af4dQ
78lasplnScvu2Pw6ofCxFBHpf0r4DH/XdeKH0BzKoQnBlu8X4bjg0A==
=/T4e
-----END PGP SIGNATURE-----