- Feb 23, 2005
- 22,902
- 2,359
- 126
In another thread I apparently didnt understand a certain part of TrueCrypt's file setup. Thats cool, I got it now
But it left me wondering a few things.
I dont necessarily need THAT high of protection, so talking theoretically. When talking about hidden volumes, bsobel you mentioned if law enforcement took a look they would see a hiddem volume. Im wondering how? TC's hidden volume leaves no headers identifying a second volume, and appears as random encrypted data...same as what the outer, or main volume would show. My understanding is it's seamless.
So then I was thinking, well, if the total size of the volume is say 10 gigs, and the hidden volume is 8 gigs, that obviously leaves 2 gigs for the honeypot, or outer volume. One could see the entire volume is 10 gigs, therefore theoretically try and a move a 9 gig file onto the volume and because the outer volume is only 2 gigs, would say not enough space. BUT! When mounting the outer volume WITHOUT volume protection, you could indeed move a 9 gig file, as it would simply use up space designated for the hidden volume. Yes, it would overwrite and corrupt the hidden volume, but it would still not reveal the actual presence of that volume. I've tried the file move experiment succesfully, and it did corrupt data inside the hidden volume, but it also moved the larger file onto the outer volume.
So my question is...how could anyone know it existed? I havent found any white papers or real life examples of a hidden volume being detected. In fact, I've found the opposite based on white papers published by Black Hat. What am I not understanding?
Second, how can we be sure the NSA, for example, could detect and decrypt anything? Because theyre the NSA? One would think there would be prosecutions of people with this scheme they have broken, but I havent found anything. With an agency THAT large, you would think SOME kind of info would leak about them breaking modern encryption. Also, with open source software, someone somewhere would detect a backdoor or beloved patriot in the armor so to speak.
Could these "hidden" files be compromised? Sure. Brute force the passcode if it's weak. Keyloggers to capture it. Lots of ways. But actually using forensics to decrypt it, or even detect it, seems very unlikely to me.
Can you provide links to explain how I am wrong? I would love to learn more.
I dont necessarily need THAT high of protection, so talking theoretically. When talking about hidden volumes, bsobel you mentioned if law enforcement took a look they would see a hiddem volume. Im wondering how? TC's hidden volume leaves no headers identifying a second volume, and appears as random encrypted data...same as what the outer, or main volume would show. My understanding is it's seamless.
So then I was thinking, well, if the total size of the volume is say 10 gigs, and the hidden volume is 8 gigs, that obviously leaves 2 gigs for the honeypot, or outer volume. One could see the entire volume is 10 gigs, therefore theoretically try and a move a 9 gig file onto the volume and because the outer volume is only 2 gigs, would say not enough space. BUT! When mounting the outer volume WITHOUT volume protection, you could indeed move a 9 gig file, as it would simply use up space designated for the hidden volume. Yes, it would overwrite and corrupt the hidden volume, but it would still not reveal the actual presence of that volume. I've tried the file move experiment succesfully, and it did corrupt data inside the hidden volume, but it also moved the larger file onto the outer volume.
So my question is...how could anyone know it existed? I havent found any white papers or real life examples of a hidden volume being detected. In fact, I've found the opposite based on white papers published by Black Hat. What am I not understanding?
Second, how can we be sure the NSA, for example, could detect and decrypt anything? Because theyre the NSA? One would think there would be prosecutions of people with this scheme they have broken, but I havent found anything. With an agency THAT large, you would think SOME kind of info would leak about them breaking modern encryption. Also, with open source software, someone somewhere would detect a backdoor or beloved patriot in the armor so to speak.
Could these "hidden" files be compromised? Sure. Brute force the passcode if it's weak. Keyloggers to capture it. Lots of ways. But actually using forensics to decrypt it, or even detect it, seems very unlikely to me.
Can you provide links to explain how I am wrong? I would love to learn more.