LinuxQuestions.org
Support LQ: Use code LQ3 and save $3 on Domain Registration
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices

Reply
 
Search this Thread
Old 06-20-2013, 09:12 AM   #31
devnull10
Member
 
Registered: Jan 2010
Location: Lancashire
Distribution: Slackware Stable
Posts: 547

Rep: Reputation: 115Reputation: 115

Quote:
Originally Posted by ChrisAbela View Post
I don't think that stlt or Truecrypt are what I was thinking about.

However, consider Slackware for example, I think that my idea might be somewhat feasible. You would need to look in the initrd and locate the stage where cryptsetup is called and replace it with other bash commands. Should a specific kamekaze password match, then it will just silently start cleaning up commands. This would involve installing a minimal encrypted installation with the new password as the encryption key over the previously encrypted partition. A tiny partition would be needed to hold the needed image or packages. Finally the initrd will have to be replaced with a standard one. If the passwords do not match however, it will pass the password to cryptsetup for normal resumption of the booting up process (if the password is correct).

In this arrangement, the authorities would not find any evidence that you cleaned the encrypted partition as they would only find a tiny functional encrypted installation with a password that you could happily divulge. The data would be lost forever but you would not provide them with any evidence.

Chris

They wouldn't try to access data on the PC by booting it up and entering the password, for that exact reason. Same reason as when they take a computer for forensic analysis, if it's switched on they don't shut it down in case there is a built in "wipe" bomb - they pull the power from it. It will all be done by a third party system.
 
Old 06-20-2013, 09:51 AM   #32
ChrisAbela
Member
 
Registered: Mar 2008
Location: Malta
Distribution: Slackware 14.1
Posts: 467

Rep: Reputation: 89
Quote:
They wouldn't try to access data on the PC by booting it up and entering the password, for that exact reason. Same reason as when they take a computer for forensic analysis, if it's switched on they don't shut it down in case there is a built in "wipe" bomb - they pull the power from it. It will all be done by a third party system.
Forensics on a properly encrypted partition would be a problem even for NSA:

Quote:
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.
As you seem well informed perhaps you can share your source for this information.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Connect 3.5" SATA HDD to Laptop directly over SATA into bay (not Firewire and USB) browny_amiga Linux - Hardware 15 12-07-2012 04:33 PM
[SOLVED] Chroot jail or Root jail bayprince Linux - Newbie 3 07-25-2011 07:43 PM
can't decrypt using openssl methodtwo Linux - Security 2 04-28-2010 03:37 PM
[SOLVED] chroot jail problem: 'empty' jail MatrixS_Master Linux - Security 4 03-27-2010 06:25 AM
Decrypt SSL ajaye1971 Linux - Security 1 08-30-2006 04:06 PM


All times are GMT -5. The time now is 09:36 AM.

Main Menu
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration