On Mon, 4 Feb 2019, Chuck Guzis via cctalk wrote:
Based on my conversations with clients, the problem is not the
equipment, but rather the lack of an open, vetted and documented file
format.

As an example, customers of mine insist on a "forensic" image file of
type E01 (Encase format), which has been endorsed by the Library of
Congress and several law enforcement agencies as a valid "forensic" format.

As insane as it sounds, I've had to provide floppy images as E01 files.
The insanity stems from the loss of information that would enable one to
recreate the original (e.g. sector headers, modulation, data rate, track
spacing, etc.).

But one does what one does to keep customers happy.

Well, conversion between E01 and IMD or teledisk formats looks straightforward.

http://www.forensicsware.com/blog/e01-file-format.html
Is there a better description handy?

eg: What is the structure of the "Header Case Information" block?

The E01 would be adequate (barely), if accompanied by an additional "metadata" file that describes the physical format. (In much more detail than just "IBM PC 360K", etc.) For MOST situations, OS, encoding, bytes per sector, sectors per track, interleave, side pattern, size of index and inter-sector gaps, etc. might do. That would still be far from PERFECT, because it would fail to catch several obvious ways to hide additional data on a disk; eg. different physical interleaves that would still read the same on "normal" reading, or RSA encrypted data with the key stored in intersector gaps. Or, a small amount of data stored as locations of deliberate disk errors. Think about ProLock.

And, of course, a lossy compression, such as MP4 leaves room for an enormous amount of steganographic data, with documants and data hidden in porn. (MANY different MP4 files will still play the same movie)

--
Grumpy Ol' Fred                 ci...@xenosoft.com

Reply via email to