thang ornithorhynchus
2009-08-28 01:45:37 UTC
Shaun, what you brought to my attention about "hiddendevs" etc, and
then Wilders and Schneier comments (fora, not personally) regarding
same, leads me to consider the use of encrypted containers on TC
hidden volumes - but one proviso, use of another proprietary container
method so that if, and its a big if, TC *has* been compromised
(perhaps from the ground up, who knows?), then at base level there
will be a *non-TC* container with industrial secrets or whatever in it
which will resist cracking.
I have therefore tried DC but it mounts as a disk, and as you know,
using hidden OS option under TC 6.2a, all non-encrypted devices or
partitions are read only. DC constructed the disk and mounted it, but
it could not format it because once it was mounted, it became a
write-protected non-encrypted device and therefore useless for the
above purpose. It could not even be formatted, let alone written to
by data.
I need to know, as an amateur cryptologist, whether there are any
non-TC encrytped containers on the market which do *not* mount as a
device or partition? Any ideas? I could Google but this seems an
interesting topic which could even be of use to you (Shaun) in the
development of the next species of DC and DCPP - use *with* TC as an
alternative in case the original (TC) is compromised - mix and match.
Heck, I'll even script the blurb for your web page if you like :)
Shaun, following on your footsteps, if I was paranoid, which I am not
really, then I would think that the construction of TC is targeted
towards ensuring that TC, and **ONLY** TC can be used to write to when
the hidden volume (OS) option is used :) No-one seems to have picked
up on this...
Comments please...
regards
thang
then Wilders and Schneier comments (fora, not personally) regarding
same, leads me to consider the use of encrypted containers on TC
hidden volumes - but one proviso, use of another proprietary container
method so that if, and its a big if, TC *has* been compromised
(perhaps from the ground up, who knows?), then at base level there
will be a *non-TC* container with industrial secrets or whatever in it
which will resist cracking.
I have therefore tried DC but it mounts as a disk, and as you know,
using hidden OS option under TC 6.2a, all non-encrypted devices or
partitions are read only. DC constructed the disk and mounted it, but
it could not format it because once it was mounted, it became a
write-protected non-encrypted device and therefore useless for the
above purpose. It could not even be formatted, let alone written to
by data.
I need to know, as an amateur cryptologist, whether there are any
non-TC encrytped containers on the market which do *not* mount as a
device or partition? Any ideas? I could Google but this seems an
interesting topic which could even be of use to you (Shaun) in the
development of the next species of DC and DCPP - use *with* TC as an
alternative in case the original (TC) is compromised - mix and match.
Heck, I'll even script the blurb for your web page if you like :)
Shaun, following on your footsteps, if I was paranoid, which I am not
really, then I would think that the construction of TC is targeted
towards ensuring that TC, and **ONLY** TC can be used to write to when
the hidden volume (OS) option is used :) No-one seems to have picked
up on this...
Comments please...
regards
thang