Liste des Groupes | Revenir à s crypt |
Stefan Claas <pollux@tilde.club> wrote:
Well, I guess this would then need a program to handle, right?
Yes, but you also need a program to handle the conversion from dates to
hex and back. Granted, few would suspect that the "date" command was
used to convert the dates back into a 'key'.
My Idea is to use no program for that, so that no evidence can be
found on the device, in case someone is looking at it.
It could be a generic erasure coding program, and the exact parameters
(block size, amount of redundancy, etc.) are remembered and specified
only when it is run to 'check' the output. Then it would, presumably,
be no more suspicious than the 'date' command itself (other than what
suspicion might be raised by the fact that most OS'es don't ship with
an erasure coder by default).
Les messages affichés proviennent d'usenet.