1994-02-24 - Re: STEALTH OCEANS

Header Data

From: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
To: cypherpunks@toad.com
Message Hash: ed1ab39e06216ca64f1d0bad96f679eebc352cee432845ecdd38cbf6b7601fe2
Message ID: <Pine.3.89.9402231850.A1835-c200000@delbruck.pharm.sunysb.edu>
Reply To: N/A
UTC Datetime: 1994-02-24 00:00:26 UTC
Raw Date: Wed, 23 Feb 94 16:00:26 PST

Raw message

From: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
Date: Wed, 23 Feb 94 16:00:26 PST
To: cypherpunks@toad.com
Subject: Re: STEALTH OCEANS
Message-ID: <Pine.3.89.9402231850.A1835-c200000@delbruck.pharm.sunysb.edu>
MIME-Version: 1.0
Content-Type: text/plain



This is my first post to this list, so please don't flame me if I make
some trivial mistake. %->


IDEA Re: making random noise files "undetectable"...
~~~~~~~  On many machines the file system allows users to "delete" files
         without actually deleting them.  This is usually accomplished by
         simply marking the disk blocks that make up the file as free.
         Thus it should be possible to write an encrypted (noise) file on 
         to disk, pad the rest of the disk with more noise and "delete" the
         whole thing, making the disk look blank to all casual observers.

PROBLEM: If the above idea is implemented, one could not write on to the
~~~~~~~  the disk for fear of accidentaly overwriting the "free" disk blocks.

SOLUTION: Knowing the _exact_ location and size of the file, one could write 
~~~~~~~~  directly to those block which are _really_ free.

2nd PROBLEM: In order to decrypt the file, one needs to know it's 
~~~~~~~~~~~  _exact_ location and size (or use some undelete util)...
             Which brings me to the...

3rd PROBLEM: An undelete utility could make recovering the encrypted
~~~~~~~~~~~  file trivial for _anyone_.

SOLUTION: Make the file undetectable to udelete utilitys by modifying
~~~~~~~~  the FAT table, or equivalent.  One would, of course, have to keep
          track of the file in some other, non-standard, way.

FINAL(?) PROBLEM: Implementing the above idea is trivial for the average
~~~~~~~~~~~~~~~~  user.  Making and recovering truely undetectable files 
                  may not be.


                                 All feedback welcome,

                                     Sergey


    ------------------------------------------------------------------
    *                                                                *
    * This is a repost of a message I posted on this list on Feb. 18 *
    * I am reposting in hope of further feedback fromm other readers *
    *                                                                *
    ------------------------------------------------------------------




Thread