User Activity

  • Modified a comment on discussion Technical Topics on VeraCrypt

    Just to try and make things more clear in case there's any confusion. I believe there should be three operating systems for plausible deniability. The first one, which he would use regularly and pretend doesn't exist, unless forced to. The second one is in the outer volume and would be used, after putting up a bit of a fight, to make the attackers think they uncovered the real hidden OS, and it should contain fake sensitive files. The third one should also be in the outer volume and should be the...

  • Modified a comment on discussion Technical Topics on VeraCrypt

    Hi! I have been requested by a friend to encrypt his hard drive in such a way where if needed, they could use plausible deniability. I am close, but I believe I have failed somewhere along the lines and was hoping for help. This is the current setup: PARTITIONS ---------- Partition 1 100 MB Partition 2 75 GB Partition 3 220 GB Partition 4 2048 MB Volumes ------- Volume 1 System Reserved 100 MB Volume 2 C 75GB Volume 3 D 220GB Volume 4 E HP_TOOLS 2048MB So from all my reading and watching videos on...

  • Modified a comment on discussion Technical Topics on VeraCrypt

    Just to try and make things more clear in case there's any confusion. I believe there should be three operating systems for plausible deniability. The first one, which he would use regularly and pretend doesn't exist, unless forced to. The second one is in the outer volume and would be used, after putting up a bit of a fight, to make the attackers think they uncovered the real hidden OS, and it should contain fake sensitive files. The third one should also be in the outer volume and should be the...

  • Posted a comment on discussion Technical Topics on VeraCrypt

    Just to try and make things more clear in case there's any confusion. I believe there should be three operating systems for plausible deniability. The first one, which he would use regularly and pretend doesn't exist, unless forced to. The second one is in the outer volume and would be used, after putting up a bit of a fight, to make the attackers think they uncovered the real hidden OS, and it should contain fake sensitive files. The third one should also be in the outer volume and should be the...

  • Posted a comment on discussion Technical Topics on VeraCrypt

    Hi! I have been requested by a friend to encrypt his hard drive in such a way where if needed, they could use plausible deniability. I am close, but I believe I have failed somewhere along the lines and was hoping for help. This is the current setup: PARTITIONS ---------- Partition 1 100 MB Partition 2 75 GB Partition 3 220 GB Partition 4 2048 MB Volumes ------- Volume 1 System Reserved 100 MB Volume 2 C 75GB Volume 3 D 220GB Volume 4 E HP_TOOLS 2048MB So from all my reading and watching videos on...

  • Posted a comment on discussion General Discussion on openKB

    Hi! I am attempting to use your unexepack tool to unpack an old 16-bit MS-DOS application on a 64-bit system. I know the code, as is, is not compatible with 64-bit OSes. I have spent a few hours trying to convert the code so it'd work on any system that supported the uint_t datatypes. I beleive I am extremely close, but currently, it's detecting the packed file as a non-EXEPACKed file. When creeping through the new code, I noticed when the packed struct gets filled in, the signature is always two...

  • Posted a comment on discussion General Discussion on SIM Card Manager

    I want to say I think I got it working. I know this is going to sound stupid, but...

  • Posted a comment on discussion General Discussion on SIM Card Manager

    Hello, I'm trying to use your program to read the SIM card in Windows 10 64-bit....

View All

Personal Data

Username:
sporkschivago
Joined:
2016-11-12 22:46:10

Projects

  • No projects to display.

Personal Tools