[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Opiated file systems
-----BEGIN PGP SIGNED MESSAGE-----
In article <[email protected]>,
Adam Back <[email protected]> wrote:
>ie. the attacker can not tell without the hidden file system key (if
>one exists) whether the unused space on your drive is really just
>that: unused space filled with garbage, or whether it is in fact
>another encrytped filesystem.
>
>They might be suspicious, but I don't think they would be able to
>claim you were in comptempt of court, if you provide the 1st key and
>claim there is no other key: the software has support for either 1 or
>2 filesystems.
>
The fixes to the encrypted loopback filesystem support for Linux that
I'll be finishing shortly (hopehopehope) incorporate, among other things,
the following features:
o encrypted filesystems
o stego'ing a filesystem in a large (say audio) file
Now, what if you do this:
Record 1/2 an hour of music from your CD, say at 8k samples/sec, 8 bits/sample,
stereo. In the _left_ channel, stego your real filesystem. In the _right_
channel, stego your duress filesystem. If the cops are suspicious that
you have a huge sound file on your hard drive and they don't believe that
it's just for audio purposes, you could (reluctantly) give up the duress key.
Does this have the properties you want?
- Ian
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMfFW2kZRiTErSPb1AQFaEAP+IRZmsZCEsY4IiKU/TW5qta+2Aljly/3X
wlW3Rp90idwh58erjY4Lnikk9fvvm0J2gb59eKObSTmAW5JzIwJpfrL00ZMJzCog
LsGL+h0HvV4VKUAYomvIZ3MoKXad6tAfIEPuiOYhQvX56my/oLElyKBaUUgKeqOZ
MwdM7pPLhbg=
=Hesa
-----END PGP SIGNATURE-----