×
Login Register an account
Top Submissions Explore Upgoat Search Random Subverse Random Post Colorize! Site Rules Donate
7

Hidden filesystem inception

submitted by v0atmage to technology 2.5 yearsNov 12, 2022 21:09:11 ago (+7/-0)     (m.slashdot.org)

https://m.slashdot.org/story/407107



15 comments block


[ - ] Kozel 1 point 2.5 yearsNov 12, 2022 21:17:29 ago (+1/-0)

[ - ] v0atmage [op] 1 point 2.5 yearsNov 12, 2022 21:23:30 ago (+1/-0)

This solves that problem- you simply give them the decoy password.

[ - ] Kozel 4 points 2.5 yearsNov 12, 2022 21:34:23 ago (+4/-0)

presence of the Shufflecake software itself cannot be hidden

they just hit you some more

[ - ] v0atmage [op] 0 points 2.5 yearsNov 12, 2022 21:39:48 ago (+0/-0)

I guess what I'm saying is they don't know if there's anything left you're hiding ultimately. So if you give them a good enough decoy they won't bash you any further.

[ - ] observation1 0 points 2.5 yearsNov 12, 2022 23:42:47 ago (+0/-0)

Unless they know you use shufflecake

[ - ] v0atmage [op] 0 points 2.5 yearsNov 12, 2022 23:46:56 ago (+0/-0)

Even if the presence of the Shufflecake software itself cannot be hidden — and hence the presence of secret volumes is suspected — the number of volumes is also hidden. This allows a user to create a hierarchy of plausible deniability, where "most hidden" secret volumes are buried under "less hidden" decoy volumes, whose passwords can be surrendered under pressure. In other words, a user can plausibly "lie" to a coercive adversary about the existence of hidden data, by providing a password that unlocks "decoy" data.

Even if they know you use it, it all boils down to whether your decoy convinces them you gave them the "real" password.

[ - ] observation1 1 point 2.5 yearsNov 13, 2022 00:06:19 ago (+1/-0)

We still lose in this prisoners dilemma scenario.

[ - ] thoughtcryme 2 points 2.5 yearsNov 13, 2022 05:17:14 ago (+2/-0)*

You are correct.
In this scenario, there is only one way to be certain you got every password and every hidden volume.
By killing him. If he dies, he has nothing left to bargain with, ie: you got it all.

If the victim is still alive, there remains a chance that another volume exists.
If he really doesn't have anymore to tell you, he'll die without telling you.
If he has more, he will tell you, to prevent his death.

In the event that he was willing to die to protect the final volume, then he was always going to die without telling you. It would also be possible to simply not kill them, but torture forever, just in case.

it all boils down to whether your decoy convinces them you gave them the "real" password.

This part only works if the captor doesn't know this. They can understand it ya know. They aren't blind to counter tactics just because they are the "bad guys".

[ - ] albatrosv15 1 point 2.5 yearsNov 13, 2022 02:41:42 ago (+1/-0)

In glorious Soviet System, people were tortured until they signed guilty papers. Some of them died in process of that.

[ - ] voatersaredumbasses 0 points 2.5 yearsNov 13, 2022 05:35:44 ago (+0/-0)

Tell me you didn't read the article without telling me you didn't read the article.

[ - ] Kozel 0 points 2.5 yearsNov 13, 2022 05:55:08 ago (+0/-0)

I did read the article, and I understood it. You didn't.

[ - ] voatersaredumbasses 0 points 2.5 yearsNov 13, 2022 06:00:43 ago (+0/-0)

Obviously not.

[ - ] Kozel 1 point 2.5 yearsNov 13, 2022 06:01:31 ago (+1/-0)

Obviously you're a faggot who didn't understand my comment and didn't understand the article either.

[ - ] GrayDragon 1 point 2.5 yearsNov 13, 2022 04:44:31 ago (+1/-0)

This is why I still use TrueCrypt. No one has the compromised decryption program but me.

[ - ] Kozel 0 points 2.5 yearsNov 13, 2022 05:55:55 ago (+0/-0)

veracrypt is the successor to truecrypt