Dear Steve,

On Oct 6, 2014, at 9:48 AM, Steve Weis <[email protected]> wrote:

> Hello Greg. I tried out Espionage.app and it was easy to distinguish
> real encrypted images from fake images via filesystem metadata. I
> don't think Espionage offers any realistic notion of plausible
> deniability, especially against "totalitarian regimes" as the webpage
> claims.

Espionage manipulates the filesystem metadata for sparsebundles, so it's 
unclear to me whether you actually were able to distinguish them or not, but if 
you were, please send an email to [email protected] with your results and 
we'll fix it!

GPG: https://www.taoeffect.com/other/A884B988.asc

Thanks for having a look.

Kind regards,
Greg Slepak

--
Please do not email me anything that you are not comfortable also sharing with 
the NSA.

> 
> This took no special skills and only a few minutes to find. Someone
> who knows more about disk forensics or the journaled filesystem can
> likely recover much more detailed usage information. I'm also suspect
> of Espionage's internal database leaking information, but did not look
> at it closely.
> 
> On Sat, Sep 27, 2014 at 7:15 PM, Greg <[email protected]> wrote:
>> I work for Tao Effect LLC, our software is on that list, and you can read
>> about how its plausible deniability compares to TrueCrypt's here...

-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
[email protected].

Reply via email to