I do a little bit of everything. Programming, computer systems hardware, networking, writing, traditional art, digital art (not AI), music production, whittling, 3d modeling and printing, cooking and baking, camping and hiking, knitting and sewing, and target shooting. There is probably more.

  • 2 Posts
  • 11 Comments
Joined 2 years ago
cake
Cake day: June 4th, 2023

help-circle

  • This is kind of how VeraCrypts hidden partition feature works.

    You start the process of the volume’s encryption and set a “false” password for it. It creates a partition that is encrypted with that password. When it finishes, you mount it and store “fake” files, the files you would reveal under duress. Veracrypt then takes in a second password and creates a “hidden partition” in the remaining free space of the disk - to be clear, that memory space still reports as unused/free if investigated, but the partition is there.

    You can then mount that with your second password and store your actual files. You can work with files and folders in the hidden partition as needed, however if anything is added or changed etc in that first fake partition, the data in the hidden partition will be corrupted by those actions.

    This means that so long as you plan ahead, someone can literally put a gun to your head and demand the password to the encrypted disk, and you can give them one that works without revealing the data to them.

    In theory, since the data in the hidden partition is encrypted and unreadable, it is impossible to detect that it exists in the “unused” space of the disk, even by a forensic analyst. To them it would just look like old, randomly flipped bits that came from previous usage followed by a quick format.

    Now, what’s really cool about this is that if you use the veracrypt bootloader, you can store and boot from an undetectable OS you store in that hidden partition, while having a decoy operating system on the visible partition:

    https://veracrypt.io/en/VeraCrypt Hidden Operating System.html







  • golden_zealot@lemmy.mltoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    16
    ·
    edit-2
    9 months ago

    I am trying to get people I know personally to stop posting and reading and instead begin to focus on the very basics of actual organization, in the form of simply being able to communicate effectively and securely.

    I have collected and written up information for them with the consideration that they are non-technical, pertaining to secure and private communications primarily, but also many more potentially useful emergency-scenario information and data which I will not speak about here.

    The package I have started giving to my friends contains information such as:

    • How to communicate securely using something like Simplex or I2P
    • How to correctly configure and use a VPN
    • How to flash a security distribution of Linux such as TailsOS to a flash drive and how to boot to it from a computer
    • How to securely encrypt data to a device using an encryption software with hidden volume features such as VeraCrypt
    • A litany of manuals for all kinds of useful information you can use in emergencies, which I will not detail here
    • Files containing the data required to build potentially useful items in emergencies given access to the correct hardware which I will not detail here

    I firmly believe that the majority of Americans will not do anything until someone is actually showing up at their door, coming after them in the street, or destroying the regularities of their personal day to day life, so my intention is to distribute materials which they can turn to when the fear sets into them well enough that they are scared to talk about such things openly.

    It is clear to me that most of my American friends at least, at this point, still only feel superficial fear and outrage. The other day I asked them “If you had to vandalize a public space with a piece of art, what would you draw or paint? Let’s say it is the side of a bank”.

    One said “tits”, one said “flowers”, one said “a fox”.

    Even in a fantasy, they would not express fear or outrage in a public setting.





  • My workflow is in FL studio, however the bigger problem is my VST libraries. I have the entire Arturia V collection as well as many, many more plugins and I am unsure if they would run on Linux, or if they do, how well. This is unfortunately a big problem as my collection of VST’s total into the thousands of dollars. I suppose I could run a windows VM to make everything function, but then I would probably have problems with latency/connectivity on my audio interface when I want to patch any of my hardware in, if drivers are even available for the interface in on Linux (It’s just a scarlett 2i2 I believe).