Excellent point and something to definitely be aware of when using
hidden containers in TrueCrypt :)
Having said that, when used in the "plausible deniability" scenario, the
contents of the primary container shouldn't need to change that much
because it's just "decoy" secret stuff. The contents of the hidden
container will most likely be what changes most.
On 10/6/2010 5:35 PM, IT-Doc24 Ltd. - Rocco Radisch wrote:
There is only one little downside to this. If someone fills up all the
space in the primary container it will overwrite the hidden container.
As Kyle said, due to its nature it cannot be determined if there is
another layer, so it cannot limit the required space of the hidden
layer. They can not know, nor see but overwrite. You need backup somewhere.
Rocco
On 06/10/2010 4:53 PM, Kyle Spencer wrote:
TrueCrypt (www.truecrypt.org) allows you to create encrypted file containers
with hidden sub-containers.
One password opens the primary container, but a different password opens the
secret sub-container.
Simply put semi-secret looking "stuff" in the primary container and put the
/real/ secret stuff in thesub-container.
If someone puts a gun to your head, you reluctantly give them the password to the primary
container (the one with the decoy secret "stuff").
Due to the way TrueCrypt works, there is no way -- even with the best computer
phorensic analysis -- that anyone can prove there is any other hidden
sub-container within the primary.
This is called "plausible deniability."
TrueCrypt is free, open-source, can encrypt your entire hard-drive without
forcing you to re-format, and has a ton of other features as well.
Check it out! www.truecrypt.org
Regards,
Kyle Spencer
----- Original message -----
http://www.bbc.co.uk/news/uk-england-11479831
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
All Archives can be found at http://www.mail-archive.com/[email protected]/
The above comments and data are owned by whoever posted them (including
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
All Archives can be found at http://www.mail-archive.com/[email protected]/
The above comments and data are owned by whoever posted them (including
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------