Excellent point and something to definitely be aware of when using hidden containers in TrueCrypt :)

Having said that, when used in the "plausible deniability" scenario, the contents of the primary container shouldn't need to change that much because it's just "decoy" secret stuff. The contents of the hidden container will most likely be what changes most.

On 10/6/2010 5:35 PM, IT-Doc24 Ltd. - Rocco Radisch wrote:
  There is only one little downside to this. If someone fills up all the
space in the primary container it will overwrite the hidden container.
As Kyle said, due to its nature it cannot be determined if there is
another layer, so it cannot limit the required space of the hidden
layer. They can not know, nor see but overwrite. You need backup somewhere.
Rocco

On 06/10/2010 4:53 PM, Kyle Spencer wrote:
TrueCrypt (www.truecrypt.org) allows you to create encrypted file containers 
with hidden sub-containers.

One password opens the primary container, but a different password opens the 
secret sub-container.

Simply put semi-secret looking "stuff" in the primary container and put the 
/real/ secret stuff in thesub-container.

If someone puts a gun to your head, you reluctantly give them the password to the primary 
container (the one with the decoy secret "stuff").

Due to the way TrueCrypt works, there is no way -- even with the best computer 
phorensic analysis -- that anyone can prove there is any other hidden 
sub-container within the primary.

This is called "plausible deniability."

TrueCrypt is free, open-source, can encrypt your entire hard-drive without 
forcing you to re-format, and has a ton of other features as well.

Check it out!  www.truecrypt.org

Regards,
Kyle Spencer

----- Original message -----
http://www.bbc.co.uk/news/uk-england-11479831





_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug

LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

All Archives can be found at http://www.mail-archive.com/[email protected]/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug

LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

All Archives can be found at http://www.mail-archive.com/[email protected]/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to