David Chessler > At 09:49 PM 2/9/2008, Tony B wrote: >>I'm not sure I believe this. Once it's been determined >>you've used TC, wouldn't there then be an assumption >>the outer container was just anouter container?
>>I mean, a "robber's purse" is not a new concept. > Check the documentation. The source code is on line. > Basically, random data on your computer, without > headers or other obvious ways of identifying it, is > a real problem to identify as such. There are ways > of identifying "steganography" because of the way <snip> Security Now had an analysis and review of TrueCrypt last year and didn't have anything negative to say about it, pretty much a glowing review. -- Take care | This clown speaks for himself, his job doesn't Wayne D. | supply this, at least not directly Take my advice, I not using it! ************************************************************************ * ==> QUICK LIST-COMMAND REFERENCE - Put the following commands in <== * ==> the body of an email & send 'em to: [EMAIL PROTECTED] <== * Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name * Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST * Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L * New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress * Need more help? Send mail to: [EMAIL PROTECTED] ************************************************************************ * List archive from 1/1/2000 is on the MARC http://marc.info/?l=computerguys-l * List archive at www.mail-archive.com/computerguys-l@listserv.aol.com/ * RSS at www.mail-archive.com/computerguys-l@listserv.aol.com/maillist.xml * Messages bearing the header "X-No-Archive: yes" will not be archived ************************************************************************