APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed


© May 2005 Tony Lawrence

TrueCrypt is on-the-fly encryption for Windows/Mac hard drives and files. One of its cute features is the ability to create a false volume that will pop up if you use a different password than that of your real encrypted data. The documentation says:

 It may happen that you are forced by somebody to reveal the
 password to an encrypted volume. There are many situations
 where you cannot refuse to reveal the password (for example,
 when the adversary uses violence). Using a so-called hidden
 volume allows you to solve such situations in a diplomatic
 manner without revealing the password to your volume.

Very cloak and dagger, spy vs. spy, isn't it? Brings to mind images of James Bond being tortured to reveal the password to his laptop. How far can we take this? Does the hidden volume reveal the passwords to yet other machines hidden volumes? Do those hidden volumes in turn contain secret plans for devices that will backfire on the usurpers? Ahh, the intrigue of espionage, thrust, counter-thrust, a web of deception.. coming soon to a theatre near you!

To disguise your secrets even more, you can create a "traveler disk" (a CD or USB stick) that contains the TrueCrypt application so that it isn't even installed on the actual machine where encrypted data is kept. The docs say that "TrueCrypt volumes cannot be distinguished from random data", so I presume you'd also want to scatter some random data about.. not that most of us don't have enough of that already. TrueCrypt fills unused volume space with random bytes also.

What's the encryption method? Just about anything, apparently; AES, Blowfish, Triple DES and various combinations where blocks are encrypted cascade style with two or three different encryption methods.

Many of us have no need for such secrecy and protection, though some folks just seem to want to encrypt on general principle: it's my private business, and therefore I encrypt it. While I don't do that myself, I do understand the philosophy behind it.

You will want to read Protecting your laptop with True Crypt and Basic TrueCrypt Usage. However, you don't necessarily need to buy anything: Linux and have built in tools for basic encryption.

Got something to add? Send me email.

(OLDER)    <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version

-> Truecrypt on-the-fly encryption

Inexpensive and informative Apple related e-books:

Sierra: A Take Control Crash Course

Digital Sharing Crash Course

Take Control of Automating Your Mac

Photos for Mac: A Take Control Crash Course

Take Control of Apple Mail, Third Edition

More Articles by © Tony Lawrence

Printer Friendly Version

Have you tried Searching this site?

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us

Printer Friendly Version

People who are more than casually interested in computers should have at least some idea of what the underlying hardware is like. Otherwise the programs they write will be pretty weird. (Donald Knuth)

Linux posts

Troubleshooting posts

This post tagged:





Unix/Linux Consultants

Skills Tests

Unix/Linux Book Reviews

My Unix/Linux Troubleshooting Book

This site runs on Linode