![]() ![]() ![]() ![]() Just to correct something I read up above on TC been broken in a previous version. ![]() Something like this goes along the very merits of why PGP was released at first, those that need it in countries where using crypto is illegal or even life threatening could benefit from a program that is not only open source, does not only contain good “plausable deniabilty” but is also given the thumbs up from someone like Mr Schneier. Things that are closed source seem to get plenty of attention but never are really professionally reviewed, all the unknowing users read is *coff**coff* “military strengh encryption using triple blowfish”….lets not say more. I think if someone like Bruce could have a look at it and give his professional opinion this would definetly serve the crypo community. I’m really not suggesting this is a practical attackīeen using this since v1.0 and still using it, Linux version is catching up to the Windows version slowly but with great success.Ī brilliant product, especially since it is 100% free with full source available.Ĭompared to commercial “bloatware” products which companies seem more than happy to lay down the green for, I think TC is something indeed to look up to. Partition doesn’t have any outer metadata and is also better performance-wise. You should either store the container on a FAT-formatted disk, or encrypt a partition. No, the “magnetic” analysis is useless.Īssuming you gave up the keys one of the volumes, the metadata for that volume tells you which sectors should not currently be in use.Īs the manual says, containers containing hidden volumes should not be stored on NTFS (or any other journaling file system that uses metadata). There are also other sources of perfectly random looking data (bascially any compressed file, zip, mp3, jpg, avi, etc). The former data could have been another encrypted container stored in the area in the past (before the present container). There could have been anything stored in that area of the disk before you stored the encrypted container there.Īlthough that data probably wouldn’t look like random noise (which the container would). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |