Dear Steve, On Oct 6, 2014, at 9:48 AM, Steve Weis <[email protected]> wrote:
> Hello Greg. I tried out Espionage.app and it was easy to distinguish > real encrypted images from fake images via filesystem metadata. I > don't think Espionage offers any realistic notion of plausible > deniability, especially against "totalitarian regimes" as the webpage > claims. Espionage manipulates the filesystem metadata for sparsebundles, so it's unclear to me whether you actually were able to distinguish them or not, but if you were, please send an email to [email protected] with your results and we'll fix it! GPG: https://www.taoeffect.com/other/A884B988.asc Thanks for having a look. Kind regards, Greg Slepak -- Please do not email me anything that you are not comfortable also sharing with the NSA. > > This took no special skills and only a few minutes to find. Someone > who knows more about disk forensics or the journaled filesystem can > likely recover much more detailed usage information. I'm also suspect > of Espionage's internal database leaking information, but did not look > at it closely. > > On Sat, Sep 27, 2014 at 7:15 PM, Greg <[email protected]> wrote: >> I work for Tao Effect LLC, our software is on that list, and you can read >> about how its plausible deniability compares to TrueCrypt's here...
-- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at [email protected].
