Re: fyi: Deniable File System - Rubberhose
Ivan Krstic wrote: Owen Blacker wrote: I wanted to create a file system that was deniable: where encrypted files looked like random noise, and where it was impossible to prove either the existence or non-existence of encrypted files. I spent some time thinking about this a few years back: http://diswww.mit.edu/bloom-picayune/crypto/15520 Rubberhose was one of the things that came up, along with StegFS and BestCrypt. Unfortunately, it seems like Rubberhose hasn't seen work in over 5 years. What you want instead is Truecrypt: http://www.truecrypt.org/ Does what Rubberhose does/did and more. And yes, actively maintained - the latest version was released April 17, 2006. -- Med vänlig hälsning, Cheers! Joachim Strömbergson Joachim Strömbergson - ASIC designer, nice to *cute* animals. snail: phone: mail web: Ö. Eriksbergsgatan 74 +46 31 - 12 14 01 [EMAIL PROTECTED] 417 63 Göteborg+46 733 75 97 02www.Strombergson.com/joachim - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: fyi: Deniable File System - Rubberhose
OK, I'll say it. This site: http://www.truecrypt.org/ makes me visualize tinfoil hats. --dan - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: fyi: Deniable File System - Rubberhose
[EMAIL PROTECTED] writes: OK, I'll say it. This site: http://www.truecrypt.org/ makes me visualize tinfoil hats. TrueCrypt is definitely deep tinfoil-hat crypto (I have an upcoming article on disk-encryption software that goes into this in more detail). That's rather unfortunate, because technically it's probably the nicest OSS disk encryption program around. Peter. - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: fyi: Deniable File System - Rubberhose
Owen Blacker wrote: I wanted to create a file system that was deniable: where encrypted files looked like random noise, and where it was impossible to prove either the existence or non-existence of encrypted files. I spent some time thinking about this a few years back: http://diswww.mit.edu/bloom-picayune/crypto/15520 Rubberhose was one of the things that came up, along with StegFS and BestCrypt. Unfortunately, it seems like Rubberhose hasn't seen work in over 5 years. -- Ivan Krstic [EMAIL PROTECTED] | GPG: 0x147C722D - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: fyi: Deniable File System - Rubberhose
On 5/2/06, Ivan Krstic [EMAIL PROTECTED] wrote: I spent some time thinking about this a few years back: http://diswww.mit.edu/bloom-picayune/crypto/15520 Rubberhose was one of the things that came up, along with StegFS and BestCrypt. Unfortunately, it seems like Rubberhose hasn't seen work in over 5 years. Don't forget http://www.truecrypt.org/ The rubberhose web site disappeared a while back, but you can google and find an archive. I too have a mirror, should that one be out of date. I once ported a crypted file system, and indeed it is quite difficult with monolithic kernels. And you are really putting your data at risk, so be sure to include backups in your implementation. And test those backups, especially if you are backing up the crypted image, as opposed to encrypting your backups. -- Curiousity killed the cat, but for a while I was a suspect -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
fyi: Deniable File System - Rubberhose
From: Owen Blacker [EMAIL PROTECTED] Subject: Deniable File System To: UK Crypto list [EMAIL PROTECTED] Date: Wed, 19 Apr 2006 11:43:18 +0100 (BST) Reply-To: [EMAIL PROTECTED] http://www.schneier.com/blog/archives/2006/04/deniable_file_s.html Some years ago I did some design work on something I called a Deniable File System. The basic idea was the fact that the existence of ciphertext can in itself be incriminating, regardless of whether or not anyone can decrypt it. I wanted to create a file system that was deniable: where encrypted files looked like random noise, and where it was impossible to prove either the existence or non-existence of encrypted files. This turns out to be a very hard problem for a whole lot of reasons, and I never pursued the project. But I just discovered a file system that seems to meet all of my design criteria -- Rubberhose http://iq.org/~proff/rubberhose.org/ : Rubberhose transparently and deniably encrypts disk data, minimising the effectiveness of warrants, coersive interrogations and other compulsive mechanims, such as U.K RIP legislation. Rubberhose differs from conventional disk encryption systems in that it has an advanced modular architecture, self-test suite, is more secure, portable, utilises information hiding (steganography / deniable cryptography), works with any file system and has source freely available. The devil really is in the details with something like this, and I would hesitate to use this in places where it really matters without some extensive review. But I'm pleased to see that someone is working on this problem. Next request: A deniable file system that fits on a USB token, and leaves no trace on the machine it's plugged into. - -- Owen Blacker, London GB Say no to ID cards: www.no2id.net - -- They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety --Benjamin Franklin, 1759 -- - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]