From: Jim Choate <ravage@einstein.ssz.com>
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Message Hash: cae749b98bfd48ec071039fceb11945afcfa1797123c035533ef4313a90ff126
Message ID: <199809221504.KAA03594@einstein.ssz.com>
Reply To: N/A
UTC Datetime: 1998-09-22 01:37:10 UTC
Raw Date: Tue, 22 Sep 1998 09:37:10 +0800
From: Jim Choate <ravage@einstein.ssz.com>
Date: Tue, 22 Sep 1998 09:37:10 +0800
To: cypherpunks@einstein.ssz.com (Cypherpunks Distributed Remailer)
Subject: Re: Stego-empty hard drives... (fwd)
Message-ID: <199809221504.KAA03594@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text
Forwarded message:
> Date: Wed, 23 Sep 1998 00:01:31 +1000
> From: Reeza! <howree@cable.navy.mil>
> Subject: Re: Stego-empty hard drives... (fwd)
> At 07:45 AM 9/22/98 -0500, Jim Choate wrote:
> >Forwarded message:
> >> From: "Neels Kriek" <kriek@bigfoot.com>
> >> Subject: Re: Stego-empty hard drives... (fwd)
> >> Date: Tue, 22 Sep 1998 01:52:03 -0500
> >> I have bee using Encrypted magic Folders for a while now. it gives you the
> >> option of encrypting all files in a specific folder. it can also do file
> >> name scrambling and even hide all the files in a directory from the OS.
> >>
> >> It activates through a hot key combination. You work on the files you want
> >> and when you exit emf the whole dir is hidden again. probably not the most
> >> secure system but it will certainly fool most them if you disable booting
> >> from a stiffy/floppy.
> >
> >The problem is this approach is detectible with a suitable 'virus scanner'
> >technology. Even if the encrypted folders and such don't appear in the file
> >system you have various other pieces of the processing agent that must sit
> >around on the drive and hence are open to signature attacks.
> >
>
> The first assertion is not entirely accurate-
Which first assertion, his or mine? Youre quoting leaves me confused (not
that it is necessarily your fault...;).
> I played with Magic Folders
> for a while- it relies on a command, usu. in the autoexec.bat or win.ini
> file (dos/windows environment) to load, with a bootable floppy disk these
> commands would would be bypassed and the so-called "hidden" folder is in
> plain sight.
One thing is clear, you can't mundge the base OS or else the catch is going
to be trivial.
____________________________________________________________________
The seeker is a finder.
Ancient Persian Proverb
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ ravage@ssz.com
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
Return to September 1998
Return to “Reeza! <howree@cable.navy.mil>”