lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20110713003514.GP1848@sentinelchicken.org> Date: Tue, 12 Jul 2011 17:35:14 -0700 From: Tim <tim-security@...tinelchicken.org> To: Ferenc Kovacs <tyra3l@...il.com> Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk> Subject: Re: Encrypted files and the 5th amendment > > check out the link in the last mail, seems to be what you are looking after. > > http://www.truecrypt.org/docs/?s=hidden-volume > > http://www.truecrypt.org/docs/?s=hidden-operating-system > > Thanks I did read the first link at least. This doesn't prevent > detection of *something else* on that disk though. Someone pointed this out to me off-list: http://www.truecrypt.org/docs/?s=hidden-volume-protection So TruCrypt can be configured to allow the trashing of your hidden volume, eliminating the information leak that I believed must exist. They've thought this through quite well. tim _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists