Opiated file systems

The Deviant deviant at pooh-corner.com
Wed Jul 17 23:01:42 PDT 1996


-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 16 Jul 1996, Mark O. Aldrich wrote:

> One problem, however, would be how to keep the "decoy" data, accessible
> with only the ambush key, "fresh" in that it must undergo a certain amount
> of
> turbulence to appear real.  The two file systems would essentially have to
> mirror each other, one with the juicy bits and one with the decoy bits.
> It would seem to be practically impossible to just build two file systems
> as one would 'disappear' when only the ambush key was used.  Wouldn't it
> be sort of obvious that something was wrong if half the disk vanished?
> 

While you do have a valid point about the turbulance needed, I think you
could still make some reasonable enough errors on the fakefs. One could
simple have several "curropt I-node tables", and that would satisfy almost
anybody (the NSA doesn't do domestic work ;)

 --Deviant


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBMe1GlDAJap8fyDMVAQHUiwf/Tc1Oq8qxx6Q9T5r57RHaDIyDaANKkUas
1VvVR2eCMlfDQAvUAFbGELEErKRTQnb+JCF9QoCH/eLrAnFcKrk+4hbcONimongO
X3wTUn3PXhQSoF3XH7u9F13npo0cAWavmlJD+16uTFxtyzt211u/APuxHrT/9jWx
mgvQtgMwkqNJICSlIRHAL4pQJ6pe1cweR8t0UxpKy55WtQzsdyF2Yh3fYSDvyaaa
L3m9qaa2QBuuLpPr7Bd5iCGlsPiyv2lo73FF9biYiKOTbo1lIKX5Sy5ITJVBFmrM
tfw7ZCxoe281k0jyyO3524Vycd5VOBOfE0atgHfMClI/E7AH9v43FA==
=chgf
-----END PGP SIGNATURE-----







More information about the cypherpunks-legacy mailing list