[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Opiated file systems



At 10:44 AM -0400 7/16/96, Mark O. Aldrich wrote:
>One problem, however, would be how to keep the "decoy" data, accessible
>with only the ambush key, "fresh" in that it must undergo a certain amount
>of
>turbulence to appear real.  The two file systems would essentially have to
>mirror each other, one with the juicy bits and one with the decoy bits.
>It would seem to be practically impossible to just build two file systems
>as one would 'disappear' when only the ambush key was used.  Wouldn't it
>be sort of obvious that something was wrong if half the disk vanished?

As far as churning goes, why not just mount both the decoy and the
encrypted filesystems simultaneously?  Have a perl script (stored on the
hidden volume of course) that automatically decodes random images from
alt.binaries.pictures.* into the decoy system and nukes the oldest decoy
files.  And go ahead and keep a copy of all your assorted /var/named &
other config files in there too.

Honest officer, I keep that partition unmounted so that a system crash is
less likely to clobber my painfully constructed configuration files - and
it's encrypted so that crackers won't be able to alter my configuration
backup to add security holes.

Let them go nuts trying to un-stego the smut images once you've given them
the duress key.


Joseph Block <[email protected]>

"We can't be so fixated on our desire
 to preserve the rights of ordinary Americans ..."
 -- Bill Clinton  (USA TODAY, 11 March 1993, page 2A)
PGP 2048bit-Fingerprint: F8 A2 A5 15 56 42 9B 16  3F BD 57 0F 8A ED E3 21