Changes

Information storage

2,042 bytes added, 10 years ago
Exercise: Go through the https://security.ngoinabox.org/en/truecrypt_main.html chapter to set up an encrypted partition. Practice moving files in an out of the encrypted container.
 
 
'''Hidden Volumes'''
As a remedy to this situation TrueCrypt offers the hidden volume feature. Think of it as a false bottom in your encrypted suitcase. If the adversary forces or intimidates you into surrendering the volume's password, you can, and they will have access the outer volume, but not the information that you truly care about protecting. This will be stored inside a hidden volume. TrueCrypt developers call this feature plausible deniability as there is no technical way to prove that a false bottom exists. It all depends on your strategy and the 'decoy' information that you choose to store in the outer volume.
 
<img>
 
 
 
From the TrueCrypt user guide: "It may happen that you are forced by somebody to reveal the password to an encrypted volume. There are many situations where you cannot refuse to reveal the password (for example, due to extortion). Using a so-called hidden volume allows you to solve such situations without revealing the password to your volume."
 
Important: The hidden disk is created inside an existing (outer) volume. Psychically it is located within the outer volume's free space, or you could imagine it as being located at the end of the outer volume. Note the hidden volume's size and always remember that your outer volume must have enough free space to host the hidden one.
 
<vid>
 
Exercise: Go through the https://security.ngoinabox.org/en/truecrypt_hiddenvolumes.html to create a hidden volume inside your existing volume from the previous section. Practice moving files in an out of the hidden volume, as well as mounting the outer and the hidden volume.
 
Note: The strategy behind using a hidden volume relies on the quality of the 'decoy' data that you wish to store inside the outer volume. This must be good enough to satisfy the adversary. The data has to be relevant and frequently updated. It should convince the adversary that they have broken your defense and there is no need to press you further.
 
Exercise: Prepare your outer volume with data that will satisfy your adversary.
252
edits