s/phorensics/forensics/

:P

On 10/6/2010 4:53 PM, Kyle Spencer wrote:
TrueCrypt (www.truecrypt.org) allows you to create encrypted file containers 
with hidden sub-containers.

One password opens the primary container, but a different password opens the 
secret sub-container.

Simply put semi-secret looking "stuff" in the primary container and put the 
/real/ secret stuff in thesub-container.

If someone puts a gun to your head, you reluctantly give them the password to the primary 
container (the one with the decoy secret "stuff").

Due to the way TrueCrypt works, there is no way -- even with the best computer 
phorensic analysis -- that anyone can prove there is any other hidden 
sub-container within the primary.

This is called "plausible deniability."

TrueCrypt is free, open-source, can encrypt your entire hard-drive without 
forcing you to re-format, and has a ton of other features as well.

Check it out!  www.truecrypt.org

Regards,
Kyle Spencer

----- Original message -----

http://www.bbc.co.uk/news/uk-england-11479831





_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug

LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

All Archives can be found at http://www.mail-archive.com/[email protected]/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug

LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

All Archives can be found at http://www.mail-archive.com/[email protected]/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to