If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
what they need to do is a password which switches in a dummy near-empty file system which contains a bit of soft pr0n so as to give plausible deniability.
some people may mock, but there are countries in the world where using disk encryption can result in an instant prison sentence if you don't immediately comply with the authorities, so having some dummy data is a good idea. Hence why trucrypt can have multiple hidden volumes.
What's it to be used for? If someone is telling you to put your password in so they can get at your files, or maybe several nuke passwords for someone to accidentally find when trying to decrypt a drive.
Once people figure out this feature exists, the new standard operating procedure for this kind of thing will be "mirror the drive first."
If someone is telling you to put your password in so they can get at your files, or maybe several nuke passwords for someone to accidentally find when trying to decrypt a drive.
You don't give access passwords all around. If you do, its your responsibility and your fault.
I implemented a similar feature to this in my local branch of Geli (the FreeBSD disk encryption framework). Granted, it's next to useless if you are under a very major investigation (wherein your disk is cloned first) but for other situations, e.g. 'spot checks', it's very useful to have. Nice to see it being implemented more widely.
what they need to do is a password which switches in a dummy near-empty file system which contains a bit of soft pr0n so as to give plausible deniability.
some people may mock, but there are countries in the world where using disk encryption can result in an instant prison sentence if you don't immediately comply with the authorities, so having some dummy data is a good idea. Hence why trucrypt can have multiple hidden volumes.
Truecrypt is very nice! I use it for backups of all my data. I don't have anything to hide other than financial data. So if a backup disk gets stolen, good luck getting my data!
What makes you think it wouldn't be configurable..? Like its so blatantly common sense that just saying that it might not be makes you come off.... lacking of common sense o.O
The article specifically says that the password is "nuke". Has anyone even read it? What a bunch of 1st grade kids.
The article specifically says that the password is "nuke". Has anyone even read it? What a bunch of 1st grade kids.
Pay more attention. The quotes are not used in the means of "this is a literal string, which contents are "nuke"", but as "this is a metaphor of what it does, it doesn't literally nukes your hard drive, it does metaphorically "nukes" the contents". Proof: first time the word "nuke" appears in quotes, it says it's "a" nuke password. Why would Michael say "a" if there aren't SEVERAL possible ones?
Comment