Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
Condor324966yAnd of course my brain just keeps going regardless.. fuck you brain 😑 if only I still had booze around to forcefully shut it down.. but I'm trying to stop drinking. So much for that 😒
-
wannabe5326y@Condor Good on ya. I was by no means an alcoholic, but my life changed drastically when I switched to non-alcoholic brews.
Friend stopped drinking due to liver issues, so I made the change with him, and it really is a lovely thing.
I like the de-alcoholized stuff too, so win-win :D -
I feel like you'd end up with something where odd blocks are part of file system A and even blocks are part of file system B
-
Actually you can have the formats already within *one* file, see https://media.ccc.de/v/...
-
Condor324966y@phorkyas that's actually a really interesting talk, thanks for linking this!
@AllanTaylor314 kinda 🤔 I was thinking of putting it into 4 equally sized chunks yesterday, some of which might be used, some of which might not. Some of which when decrypted could also nuke the authorized keys for another chunk (similar to how LUKS nuke keys work I guess, but I haven't looked much into that yet) so that they can never be opened again.
There's several problems with that though.. for starters, who'd want to not use their whole storage? Additionally, the modification of the metadata of another chunk could theoretically be suppressed by a modified version of the software at the police department, making the nuking of other chunks impractical when you're forced to decrypt it using their device... Might need to rethink it a bit.
@M1sf3t not to worry, I closed devRant and went to sleep shortly after I made this post 😛 -
@Condor glad you appreciate that stuff. Couldn't find friend or colleague who'd share enthusiasm for it.
-
Wack63116yI can see how read operations would work, and I could see an initial write operation (which needs a lot of processing first), but how would updates work. Besides that, what's stoping an atacker (on goverment level) of just cloning the disk and run different atacks?
Me: I'm super tired, it's the middle of the night and I really should get to sleep already...
Brain: hey hey Condor! I've got this great idea, a cryptographic filesystem-level vault that decrypts into different files depending on what key you give it!!! Let's implement it, all-nighter, what do you think? 🙃
Goddammit brain, that's super interesting but not now!!! I need to sleep ffs 😡
rant