Re: linux kernel loopback encryption

New Message Reply About this list Date view Thread view Subject view Author view

Oskar Pearson (oskar@is.co.za)
Tue, 21 Jul 1998 12:58:59 +0200


Hi

> If I make one big filesystem and then stick the encrypted filesystem
> images on the disk as files, it's obvious what they are. I really wish I
> could hide this data, but it will look out of place no matter where I hide
> it.

> Are there any "legitimate" uses for having huge blocks of random data on
> your drive? Are there any which the goons will believe?

hmm. I presume that xoring your data with a OTP is not export controlled?

If you have a friend that can sacrifice a gig that you trust I guess that
you could consider it a OTP.

You would have to create the OTP with 'dd if=/dev/random' though. otherwise
the sections that you haven't written to when making the filesystem haven't
got random data in.

This is assuming that the data doesn't change. If you change your side
the other side has to change too - and that opens a whole can of worms.

I would guess that you would have to show:

1) programs to actually use the big file as a OTP
2) previous use of the file as an OTP.
3) Reason you didn't use a simply encryption system.

Oskar

---
"Haven't slept at all. I don't see why people insist on sleeping. You feel
so much better if you don't. And how can anyone want to lose a minute -
a single minute of being alive?"				-- Think Twice


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:20:44 ADT