|
2010-01-13
, 12:33
|
|
Administrator |
Posts: 1,036 |
Thanked: 2,019 times |
Joined on Sep 2009
@ Germany
|
#12
|
|
2010-01-13
, 12:44
|
Posts: 355 |
Thanked: 566 times |
Joined on Nov 2009
@ Redstone Canyon, Colorado
|
#13
|
|
2010-01-13
, 12:57
|
Posts: 1,224 |
Thanked: 1,763 times |
Joined on Jul 2007
|
#14
|
The Following User Says Thank You to Matan For This Useful Post: | ||
|
2010-01-13
, 13:02
|
Posts: 355 |
Thanked: 566 times |
Joined on Nov 2009
@ Redstone Canyon, Colorado
|
#15
|
The Following User Says Thank You to jebba For This Useful Post: | ||
|
2010-05-17
, 13:50
|
Posts: 726 |
Thanked: 345 times |
Joined on Apr 2010
@ Sweden
|
#16
|
Nothing is being overwritten. We're not trying to erase anything here, this is before data has been written. The idea is to make it so it can't be seen how much data has been written to the filesystem. In other words, if you have a 100 meg filesystem with 99 megs of zeros, it's known there is 1 meg of data that needs to get cracked. If it's all filled with random/encrypted data, then the attacker doesn't know how much real data is there.
|
2010-05-17
, 14:55
|
Posts: 292 |
Thanked: 131 times |
Joined on Dec 2009
|
#17
|
Could you please supply an argument for why an attacker would care about the size of data stored on the encrypted device? No matter the amount of data, it's still encrypted and if you picked good enough a passphrase and enough bits in the key, it will still take as much time to crack, no matter what the attacker knows.
|
2010-05-17
, 15:01
|
Posts: 292 |
Thanked: 131 times |
Joined on Dec 2009
|
#18
|
The Following User Says Thank You to soeiro For This Useful Post: | ||
|
2010-05-17
, 15:10
|
Posts: 726 |
Thanked: 345 times |
Joined on Apr 2010
@ Sweden
|
#19
|
First, there are situations where just knowing that something is there is equally as good (or as bad) as knowing what is there.
Second, by analyzing the exact size it is possible to help to infer what kind of information is there.
Third, it is a lot easier to perform cryptanalysis when the exact size is known.
|
2010-05-18
, 02:55
|
Posts: 355 |
Thanked: 566 times |
Joined on Nov 2009
@ Redstone Canyon, Colorado
|
#20
|
@jebba
Did you try to store N900 personal data in the encrypted file? In other words, did you try to encrypt the partition that N900 stores personal information?
My idea is simple. I want my personal info (contacts, alarms, emails, pins, etc) to be unavailable if my device is stolen or lost.
Since there is nothing big deal (I just don't want my pictures, PINs and contacts being posted to the Internet or to credit card scammers), i could use a really fast but not so state of the art encryption...
cryptsetup seems to work fine,
but with your kernel cameras are not working.
(mplayer show only green screen, build-in camera tool
report "failed to start")
n.