Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Consider what your goals are with respect to encryption -- allowing the deltas generated by modifying your TrueCrypt volume will almost certainly make it easier for an adversary to break into your encrypted volume.


Are the algorithms used weak to that? I know that deltas will reveal the locations of changes and also let you detect whenever the same sector has the same bytes written to it. What else might be revealed?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: