1993-11-20 - Encryption: A Testimonial

Header Data

From: Eric Blossom <eb@srlr14.sr.hp.com>
To: honey@citi.umich.edu
Message Hash: 2da7e52506f7091365204f7900f5b258087bc3c887ddb638ad4f829cd1427b20
Message ID: <9311192245.AA07357@srlr14.sr.hp.com>
Reply To: <9311191405.AA03550@toad.com>
UTC Datetime: 1993-11-20 07:47:01 UTC
Raw Date: Fri, 19 Nov 93 23:47:01 PST

Raw message

From: Eric Blossom <eb@srlr14.sr.hp.com>
Date: Fri, 19 Nov 93 23:47:01 PST
To: honey@citi.umich.edu
Subject: Encryption: A Testimonial
In-Reply-To: <9311191405.AA03550@toad.com>
Message-ID: <9311192245.AA07357@srlr14.sr.hp.com>
MIME-Version: 1.0
Content-Type: text/plain



> > Actually, you could fool a lot of people by creating a hidden disk
> > partition.  Nobody would know there was anything hidden unless they did
...
> this is very easy in unix:  put your secret stuff in a directory,
> then mount a file system on that directory.

Another nice way is to remove the dev files for the disk at
shutdown time.  Then at reboot, you'd have to manually create dev
files (knowing the major and minor numbers) and manually mount the
file system.  There'd be no trace.  This would work real well with big
disks... Is that a 1.0, 1.1 or 1.2G filesystem?  How much swap is
allocated, anyway?  You could also use a litte steganography and spare
out a set of ``bad'' sectors.  Some controllers will do the sector sparing
for you (transparently to the OS)...  All sorts of opportunities ;-)

	Eric Blossom





Thread