Truecrypt -text -list #To see where was this mounted (/dev/mapper/truecrypt0 or /dev/loop0)įormat outer volume with FAT: sudo mkfs.vfat /dev/mapper/truecrypt0Ĭreate a (ex: 50M) hidden volume within the outer volume (ex: on /dev/sdb1): truecrypt -filesystem none -type hidden -size 50M -encryption AES -hash SHA-1 -random-source /dev/urandom -c /dev/sdb1 Map the corresponding volume (ex: on /dev/sdb1), but do not mount it: truecrypt /dev/sdb1 #You can now format and mount the volume etc (optionally using LVM first)Ĭreate an outer volume (ex: on /dev/sdb1): truecrypt -filesystem none -type normal -encryption AES -hash SHA-1 -random-source /dev/urandom -c /dev/sdb1 ![]() Truecrypt -keyfiles=test_truecrypt.key -password=Test_pa55word -filesystem=none -protect-hidden=no /dev/sdb5 #Mount the volume without trying to mounting the absent filesystem Truecrypt -filesystem=none -volume-type=normal -encryption=AES -hash=SHA-512 -random-source=/dev/urandom -quick -keyfiles=test_truecrypt.key -password=Test_pa55word -c /dev/sdb5 Truecrypt -create-keyfile -random-source=/dev/urandom test_truecrypt.key It is important that you keep a dummy OS and destroy or hide(usb flash drive buried in the garden) the TrueCrypt boot data, otherwise there is no plausible deniability. TrueCrypt is an open-source disk encryption software implementing steganography but as of 7.1 dose not fully support Ubuntu due to an incompatible license and only limited features & documentation are available on Ubuntu. To address this, different projects exist to implement some steganography mechanisms. However, a significant problem caused by most of the existing implementations is that the owner of the data may be forced to reveal the password used to encrypt the data. There is a lot of documentation on how to create an encrypted volume. ![]() ![]() For instructions on using the new TrueCrypt GUI, please see TrueCrypt GUI
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |