Re: linux kernel loopback encryption

New Message Reply About this list Date view Thread view Subject view Author view

proff@iq.org
Tue, 21 Jul 1998 21:43:04 +1000 (EST)


> >>Are there any "legitimate" uses for having huge blocks of random data on
> >>your drive? Are there any which the goons will believe?
>
>
> >Secondary Swap Files(TM)? ;-)
>
> Look in the archives for my articles on building a crypto dongle. The
> goons can't do anything if it is physically impossible for even the owner
> of the encrypted data to decrypt it. :)

I deal with this issue (and a few others) in marutukku by simply
having a key salting (and block whitening) file. This file is small
(around 2k), and without it, not even the holder of the passphrase(s)
can decrypt the data. You can place the salt data on floppy disk
or (working on it :) Java Ring. So if traveling with your laptop,
you might forward the Java Ring by secure post, or pgp'd email to
your destination. If at some point you become concerned about duress
(and don't think that cryptographic deniability is going to save
you), then destroying the entire partition forever (and every ciphertext
backup) is as simple as wiping your salt file, or biting down on le Ring :)

Cheers,
Julian.


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:20:44 ADT