![]() Maybe it's new, maybe you haven't formatted it yet (actually you are hiding stuff there). For onlookers it will appear you just have an empty unformatted drive. The benefits of a drive is that you just have don't have a file lying about that could draw attention to itself. For the first example, we will use a physical drive. The file can then be stored anywhere that a normal file can. One is stored like a normal partition on a physical drive. This is the GNOME Partition Editor and is available in the normal repositories. While you're at it, make sure you have the 'GParted' package installed too. The GUI will become available in the 'other' folder in your applications menu. ![]() It will come in a compressed file, so you'll need to decompress it and then run the deb file. Go to the Linux section and select Ubuntu DEB. However, it is opensource and free for you to use. TrueCrypt is not currently available in the repositories for various reasons (possibly licensing). The TrueCrypt system is easy to use, uses very strong encryption (US government agencies are authorised to use this cipher for all levels up to top secret), and is also Windows and Mac compatible for those people who share external devices with Windows / Mac systems too. Provided the dummy files you have provided are interesting enough they'll probably be kept busy trying to work out why you encrypted them or simply feel happy you didn't have anything worth finding. They cannot ascertain if there is anything in the free space remaining and you have complied with the law and provided the decryption key. They see your not so sensitive hidden files. They can decrypt the first container drive. When forced under coercion to provide an encryption key, you provide the first one. It could just be free space within the first drive. Without that key it should be mathematically impossible to identify whether the random data is in fact random data or a second hidden encrypted drive. This drive can only be accessed with a second encryption key. Then within this random data, a second hidden drive is placed. The remaining space is made up of random data. ![]() Some non sensitive files are put on this drive. Don't do it.īasically, first a container encrypted drive is created. If you fail to prove an encryption key when legally required to do so, you could breaking the law. This is now possible!ĭISCLAIMER: I do not, and will not ever advocate breaking laws. Imagine if they could never prove that you were hiding any additional documents and that you could therefore show that you have been completely complaint with the law and yet still keep your files safe. ![]() Imagine if you could comply, give them a key that they can use, decrypt some files you don't care about and still not have access to your sensitive files. It can be a criminal offence not to provide or to claim you have forgotten these keys. Recently a number of governments have implemented laws where you can be forced to provide encryption keys to officers (for example at airports) so that they can decrypt your files. Perhaps you don't want people to know they exist. The first is because you have sensitive files as mentioned above. Why would you want to create a hidden drive? There are two main reasons. An encrypted drive provides a safe place to put these kind of files so that people cannot see or access them without a password. Why would you want to create an encrypted drive? Why not? Probably the main reason is that you have some security sensitive file that you don't want other people to have access to. TrueCrypt is not currently available in the Ubuntu repositories. It covers installing and using the TrueCrypt software (version 6.1) and Ubuntu 8.10 (Intrepid Ibex). This is a guide explaining how to create a secret encrypted drive the easy way using a graphic user interface.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |