----- Forwarded Message ----- From: "Pavol Luptak" wilder@trip.sk To: cryptoanarchy@lists.progressbar.sk Sent: Monday, December 5, 2011 5:22:41 PM GMT -05:00 US/Canada Eastern Subject: [Cryptoanarchy] [anagon@gmail.com: [Freedombox-discuss] Introducing DM-Steg: Deniable encryption for Linux]
----- Forwarded message from Leo Samulis anagon@gmail.com -----
Hello folks,
I'd like to introduce DM-Steg. It's a Linux device mapper module that provides deniable/steganographic encryption. DM-Steg provides similar capabilities to Rubberhose (a now defunct project by Julian Assange et al.) and more advanced deniable encryption than Truecrypt.
DM-Steg can be used to hide any number of strongly encrypted volumes inside block devices or files. Without keys, there is no way for an attacker to determine how many volumes a block device contains or even if the block device is not simply random data. DM-Steg uses strong encryption yet still achives good performance - up to 148 MB/s on my core 2 duo, and only 1% slowdown on kernel compiles.
With GRUB support, DM-Steg will allow a physical computer to boot into one of many 'personalities'. This could allow a computer to act as a router or fileshare hub for a censorship-free network, yet if seized by authorities, appear to be completely innocuous.
DM-Steg is working code and free software, so please head over to http://dmsteg.sf.net and grab the tarball. For those interested in the mechanics of DM-Steg, the .pdf file on the site should provide a good overview.
I've taken this project as far as I want so I'd very much like it if there's anyone in the OSS community who wants to take it further. Don't be shy! :)
All the best,
Leo ----- End forwarded message -----h