Main » 2011 » Март » 16 » Hidden encrypted disk with protection from termorektalnoy transcripts
11:32
Hidden encrypted disk with protection from termorektalnoy transcripts
Recently, the blog "Information Security" slipped a few topics about how to encrypt data for protection from a mask show. But all these methods, based on intense discussion in the comments, does not validate the soldering iron.

So I want to suggest your own way to protect data from special interests of persons in masks - data encryption on a hidden drive that has an extra level of protection from the soldering iron.

While such a possibility only found in the program truecrypt (opensource, win / linux / mac) - "hidden volume", so I will talk to her example. Although it is possible in other shifrovalshikah have something like that.

It works as follows:
  1. creates a file with an encrypted disk, which is encrypted with the first password, for example data.img, connects the disk.
  2. On this CD are written any semi-palevnyh data, which, after much persuasion in the case of threat of use of a soldering iron and you can show ill-wishers by typing this the first password. Well, that is, that they were similar to the data that you really wanted to hide from the eyes of the owners of a soldering iron, but not really very scared if they find them.
    These data do not need to score the entire disc to the eyeballs, but only part, leaving an empty seat.
  3. Over the remainder of free space on the data of the first disk in a file data.img create another drive that is encrypted with the second password. This disc is already recorded the most valuable information that can not show even after direct contact with a soldering iron.
The result is a single file with two encrypted disks.

Total all will look like this:

Using the first password, we have access only to the first disk, and the presence of the second disc, as developers declare truecrypt (itself deeply delved into the subject, trusting their words) no way to know is impossible without knowing the second password.

A, respectively, knowing the second password, you can without too much trouble to access the second disk with the main data.

The program also has a mode to connect the first disk with protection from data corruption of the second disk (in this case are asked both passwords), or when writing to a first drive in normal mode, you can spoil the hidden data of the second disc.

All this is done through GUI-interface programs, special difficulties in the settings cause it should not. Also supported by work in console mode, which lets you work with these drives through a script.



Total, if we come to the mask-show, the action plan is as follows:
  1. We pay professionals who came to a thorough probing your server.
  2. They find it suspiciously large file, begin to pester us with questions.
  3. We first make excuses, saying that this is just the swap, backup, archive Pron, or something else, in general break comedy.
  4. Once they begin to pour in from the serious threat, yet it is admittedly an encrypted data disc, with tears and snot to inform them first password.
  5. They are happy to connect using this password the first disk, retrieve data, they find something terrible is smooth, slightly dryuchat you for this release.
In the end, and the wolves are fed (they still made you open the encrypted disk and found what otdryuchit, even without knowing that behind it there is something else) and the sheep are safe (you will not have shown them the most valuable data and they did not even try you have to shake out with a soldering iron, that they wrought an easy fright).

UPD: I do not propose a way to be protected from soldering and solve all the problems, I've just described the an additional opportunity to protect their data from the second level of privacy, which by the way is not noticeable even after a thorough search.

And if enemies are unaware of the existence of your hidden second disc, it appears on its face does not notice his presence and, accordingly, will not spend the extra electricity to the soldering iron. And how to make sure that they do not have guessed this - a task for each individual, using ingenuity and creativity.

And this method is more reliable than the production server at the company for allegedly blank hard drive without partitions (hidden encrypted partitions), which immediately arouse suspicion. And then the file has caused suspicion, we have deciphered the first password, show all data and calmed down and that suspicion in the same file may be yet another encrypted disk is unlikely that there will be no direct fire.
Views: 382 | Added by: w1zard | Rating: 0.0/0
Total comments: 0
Имя *:
Email *:
Код *: