11:32 Hidden encrypted disk with protection from termorektalnoy transcripts | |
Recently, the blog "Information Security" slipped a few topics about how to encrypt data for protection from a mask show. But all these methods, based on intense discussion in the comments, does not validate the soldering iron. So I want to suggest your own way to protect data from special interests of persons in masks - data encryption on a hidden drive that has an extra level of protection from the soldering iron. While such a possibility only found in the program truecrypt (opensource, win / linux / mac) - "hidden volume", so I will talk to her example. Although it is possible in other shifrovalshikah have something like that. It works as follows:
Total all will look like this: Using the first password, we have access only to the first disk, and the presence of the second disc, as developers declare truecrypt (itself deeply delved into the subject, trusting their words) no way to know is impossible without knowing the second password. A, respectively, knowing the second password, you can without too much trouble to access the second disk with the main data. The program also has a mode to connect the first disk with protection from data corruption of the second disk (in this case are asked both passwords), or when writing to a first drive in normal mode, you can spoil the hidden data of the second disc. All this is done through GUI-interface programs, special difficulties in the settings cause it should not. Also supported by work in console mode, which lets you work with these drives through a script. Total, if we come to the mask-show, the action plan is as follows:
UPD: I do not propose a way to be protected from soldering and solve all the problems, I've just described the an additional opportunity to protect their data from the second level of privacy, which by the way is not noticeable even after a thorough search. And if enemies are unaware of the existence of your hidden second disc, it appears on its face does not notice his presence and, accordingly, will not spend the extra electricity to the soldering iron. And how to make sure that they do not have guessed this - a task for each individual, using ingenuity and creativity. And this method is more reliable than the production server at the company for allegedly blank hard drive without partitions (hidden encrypted partitions), which immediately arouse suspicion. And then the file has caused suspicion, we have deciphered the first password, show all data and calmed down and that suspicion in the same file may be yet another encrypted disk is unlikely that there will be no direct fire. | |
|
Total comments: 0 | |