David Chessler
> At 09:49 PM 2/9/2008, Tony B wrote:
>>I'm not sure I believe this. Once it's been determined
>>you've used TC, wouldn't there then be an assumption
>>the outer container was just anouter container?

>>I mean, a "robber's purse" is not a new concept.

> Check the documentation. The source code is on line.
> Basically, random data on your computer, without
> headers or other obvious ways of identifying it, is
> a real problem to identify as such. There are ways
> of identifying "steganography" because of the way
 <snip>

Security Now had an analysis and review of TrueCrypt
last year and didn't have anything negative to say
about it, pretty much a glowing review.

-- 
Take care  | This clown speaks for himself, his job doesn't
Wayne D.   | supply this, at least not directly
Take my advice, I not using it!


************************************************************************
* ==> QUICK LIST-COMMAND REFERENCE - Put the following commands in  <==
* ==> the body of an email & send 'em to: [EMAIL PROTECTED] <==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]
************************************************************************
* List archive from 1/1/2000 is on the MARC http://marc.info/?l=computerguys-l
* List archive at www.mail-archive.com/computerguys-l@listserv.aol.com/
* RSS at www.mail-archive.com/computerguys-l@listserv.aol.com/maillist.xml
* Messages bearing the header "X-No-Archive: yes" will not be archived
************************************************************************

Reply via email to