
-----BEGIN PGP SIGNED MESSAGE----- On Tue, 16 Jul 1996, Mark O. Aldrich wrote:
One problem, however, would be how to keep the "decoy" data, accessible with only the ambush key, "fresh" in that it must undergo a certain amount of turbulence to appear real. The two file systems would essentially have to mirror each other, one with the juicy bits and one with the decoy bits. It would seem to be practically impossible to just build two file systems as one would 'disappear' when only the ambush key was used. Wouldn't it be sort of obvious that something was wrong if half the disk vanished?
While you do have a valid point about the turbulance needed, I think you could still make some reasonable enough errors on the fakefs. One could simple have several "curropt I-node tables", and that would satisfy almost anybody (the NSA doesn't do domestic work ;) --Deviant -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBMe1GlDAJap8fyDMVAQHUiwf/Tc1Oq8qxx6Q9T5r57RHaDIyDaANKkUas 1VvVR2eCMlfDQAvUAFbGELEErKRTQnb+JCF9QoCH/eLrAnFcKrk+4hbcONimongO X3wTUn3PXhQSoF3XH7u9F13npo0cAWavmlJD+16uTFxtyzt211u/APuxHrT/9jWx mgvQtgMwkqNJICSlIRHAL4pQJ6pe1cweR8t0UxpKy55WtQzsdyF2Yh3fYSDvyaaa L3m9qaa2QBuuLpPr7Bd5iCGlsPiyv2lo73FF9biYiKOTbo1lIKX5Sy5ITJVBFmrM tfw7ZCxoe281k0jyyO3524Vycd5VOBOfE0atgHfMClI/E7AH9v43FA== =chgf -----END PGP SIGNATURE-----