Assume linux + latest veracrypt (vc), and a veracrypt file container (1Gb) having 100 files:
person A repeatedly modifies file2 in the container (eg adds/modifies 1mb text), which changes the container bitmap. the container is locked/unmounted and sent to B before A remodifies it.
person B attacks and repeatedly sees the locked container (A sends it for backup reasons).
can B pinpoint that the changes happend in file2? (when eg mediator C comes in and A,B both have a look into the unencrypted container together)
variant of it: can B pinpoint the file2 if all the files resided in a hidden volume?
Last edit: funny 2020-03-07
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Assume linux + latest veracrypt (vc), and a veracrypt file container (1Gb) having 100 files:
person A repeatedly modifies file2 in the container (eg adds/modifies 1mb text), which changes the container bitmap. the container is locked/unmounted and sent to B before A remodifies it.
person B attacks and repeatedly sees the locked container (A sends it for backup reasons).
can B pinpoint that the changes happend in file2? (when eg mediator C comes in and A,B both have a look into the unencrypted container together)
variant of it: can B pinpoint the file2 if all the files resided in a hidden volume?
Last edit: funny 2020-03-07
What is a "container bitmap"? The rest of the post is very hard to understand too...
Last edit: Poseidon 2020-03-10