* Posts by Yatsura

3 publicly visible posts • joined 25 Nov 2009

Why no one smells a RAT: Trojan uses YAHOO WEBMAIL to pick up instructions

Yatsura

Re: Another reason

Err, you can do this with Firefox, Chrome, etc see Selenium.

US killer spy drone controls switch to Linux

Yatsura
FAIL

Funny, everybody seems to agree with El reg slant. There doesn't seem to be actually any reason to believe that they replaced Windows with Linux because of a virus. Linux seems to of given them a better display environment.

There where told to change their procedures after that outbreak.

RIPA III: A legislative turkey comes home to roost

Yatsura
Boffin

RE: Two major flaws

Sure, NP.

The idea is that you create a volume that is 2GB. This volume is a single file, which gives the encrypted drive on the non-encrypted drive room to grow. The unused part of the encrypted volume doesn't just have 00 are anything else. It _should be_ indistinguishable for the encrypted part without the key.

Without the key it all looks encrypted. If the noise at the end is another encrypted volume then opening the first volume with the key just looks like the noise you'd get if there was not encrypted volume. It does mean that the container volume with overwrite the hidden volume because it doesn't know that it is being used. Just like the unused part of a physical drive, the file system will just see it as free unallocated space and use it up. Typing in the other password means that it will decrypt in a way shows the hidden volume, it scans until it finds a valid decryption.

I say should they are thing like TCHunt which have vectors against this

P