Cryptography

We have built a piece of software that can generate a crypto-vault where you can embed various loop devices. Each loop device has a password. Mounting the Crypro-valut with a password mounts his loop device. The size of each loop device is managed to prevent any data-loss for internal mountpoint overlap.

Without any password the crypto-vault is only random noise for an attacker.

If menaced, the user can fall back to plausible deniability, revealing only one or two of the passwords (corresponding to as many misleading false-secret mountpoints).



For every kind of contact, send an email to info (at) gipoco DOT com

CopyLeft © 1999-2024 by HackLab Savona, Creative Commons Licensed, Attribution - Not Commercial - No derivative