Cryptography

We have built a piece of software that can generate a crypto-vault where you can embed various loop devices. Each loop device has a password. Mounting the Crypro-valut with a password mounts his loop device. The size of each loop device is managed to prevent any data-loss for internal mountpoint overlap.

Without any password the crypto-vault is only noise for an attacker.

If menaced, the user can fall back to plausible deniability, revealing only one or two of the passwords (corresponding to as many misleading false-secret mountpoints).



For every kind of contacts, send an email to info (at) gipoco DOT com

CopyLeft © 1999-2021 by HackLab Savona, NO Rights Reserved. Creative Commons Licensed