[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110712223948.GL1848@sentinelchicken.org>
Date: Tue, 12 Jul 2011 15:39:48 -0700
From: Tim <tim-security@...tinelchicken.org>
To: "Thor (Hammer of God)" <thor@...merofgod.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Encrypted files and the 5th amendment
> Actually, there is no way to tell if the there is another encrypted
> volume in existence or not. One might stipulate that there "could" be
> if the filesize is obvious, but when you get into gig size files that
> are storing small amounts of data, that argument loses value.
Well, yes, if you are trying to hide small amounts of data, then there
are many ways to do it with plausible deniability. I thought you were
talking about booting entire separate OSes based on boot-time
password. Would be hard to hide that amount of data without at least
raising suspicion to a determined investigator.
Then again, many investigators are not determined. Keep the partition
small, put it inside another encrypted partition, maybe they'll miss
it.
tim
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists