Oh, so *** that's *** what the phrase rubber hose decryption means;
in some previous post (probably recently - in the parent thread?) that
phrase was used but I thought maybe it was some FOSS tool that I was not
familiar with.
...sorta timely, since there is all kinds of ruckus going on in the
Yeah, that's why TrueCrypt's ability to hide the volume on a device is
so awesome. The idea is, people don't realize anything is even there to
BE encrypted.
One thing I was reading about with regard to plausible deniability is to
hide your volumes inside of other files. For example, I have a jump
On Fri, May 1, 2009 at 1:52 PM, Mike Schwartz mike.l.schwa...@gmail.com wrote:
Oh, so *** that's *** what the phrase rubber hose decryption means;
in some previous post (probably recently - in the parent thread?) that
phrase was used but I thought maybe it was some FOSS tool that I was not
I made the file, I didn't overwrite an existing one. Yes, it's possible
to find the file, but it's hard to figure out what it is (since
TrueCrypt leaves no headers although the topic the thread WAS
detection).
The idea, more than anything, is that I can say I have no idea what the
extra file
On Fri, 1 May 2009, Joe wrote:
I made the file, I didn't overwrite an existing one. Yes, it's possible
to find the file, but it's hard to figure out what it is (since
TrueCrypt leaves no headers although the topic the thread WAS
detection).
The idea, more than anything, is that I can