1998-09-21 - Re: Stego-empty hard drives… (fwd)

Header Data

From: Jim Choate <ravage@einstein.ssz.com>
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Message Hash: 2b849fe1e446e34061ba42048b458d0e811ada5565a4445f94b46d3d775a909a
Message ID: <199809220241.VAA20426@einstein.ssz.com>
Reply To: N/A
UTC Datetime: 1998-09-21 13:13:39 UTC
Raw Date: Mon, 21 Sep 1998 21:13:39 +0800

Raw message

From: Jim Choate <ravage@einstein.ssz.com>
Date: Mon, 21 Sep 1998 21:13:39 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809220241.VAA20426@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Forwarded message:

> Date: 22 Sep 1998 02:15:42 -0000
> From: Anonymous <nobody@remailer.ch>
> Subject: Re: Stego-empty hard drives... (fwd)

> > How do you propose to do this? Via a BIOS setting?
> 
> By default. The machine boots. It is either told to accept a passphrase or
> is told nothing. If the latter, it boots normally, only with its HD-hiding
> code. If the former, it prompts, accepts a passphrase, and then boots
> normally, only with the HD-hiding code disabled.

Understood.

> What I think you're asking is how the actual cryptography would be done. I

That aspect is trivial from the mod-the-BIOS perspective, let's assume for a
moment that the crypto is in the ROM-burner...

Specificaly I am asking:

Given a BIOS which has been modified to allow the end-user to select between
encrypted and non-encrypted operation, how is the end-user supposed to
make this selection?

So far I've seen two suggestions:

1.	The BIOS is only 'sensitive' at particular points in the POST.

2.	The BIOS has a user-accessible selection via some method to
	activate their selection.

Both are workable, I'm looking for a more specific description of the
methods.

In the case of 1., is the marker going to be particular windows which are
bounded by particular messages printed to the boot console? In the case of
2. is it going to be a particular 'magic keystroke' that enables some hidden
option screen?

It seems to me that both have obvious methods of attack if the only goal is
to demonstrate to a legal standard that such capability exists.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





Thread