by darkskinnedneighboor » Mon Jul 23, 2018 7:17 am
The cryptsetup method enables me to give the key to the encrypted partition and when the encrypted partition is opened there is just sample files that aren't actually serious? Yes I can write the whole disk with random data but if, for example, if the police comes here then they have the right to see whats in the encrypted partition. What's neat about Veracrypt is it, by default, allocates a part of random data when you create an encrypted partition. Now this random data can be used as a legitimate space, hence hidden, and cannot be proven by anyone that it's an encrypted partition. Now if I encrypt a partition with cryptsetup then anyone with a badge have the right to see what's in there. In the case of veracrypt I can give them a passwd and they open the whole partition, let's say 30 GB, with this key but there will just be 15 GB worth of files in there. The file system will be shown as 30 GB but it's actually only displaying the 15 GB I've put in there and not the other 15 GB that is hidden. However if I enter the OTHER key then a 15 GB partition gets unlocked, the hidden one, where the real 15 GB worth of files are. Does cryptsetup have the ability to render 30GB as 2 encrypted partitions where the other one is disguised within the whole part and cannot be proven to be anything other than random data? No, hence why I'm asking.