johnridley: (antikythera)
I've been thinking about security in my spare brain cycles lately, and I haven't been able to Google up anything specifically about this thing I thought of a few days ago:

Truecrypt has a "plausible deniability" mechanism where you can create TWO encrypted volumes in one. If you use one password, you get one volume, another gives you a hidden volume. It's carefully engineered so that there's no way to prove that the hidden volume exists, so that you can give the first password to a leg-breaker and say "that's my password."

However, I wonder if this isn't quite as good as it sounds. The normal and hidden volumes start at opposite ends of the volume, so directory sector overwrites (which happen a lot more than normal sector overwrites) happen at opposite ends.

Modern flash devices such as USB thumb drives utilize "wear levelling" which according to WP means that most of the memory cells in the device are only good for 1000 writes or so, but there are some cells engineered to take 100,000 writes before failing, and the controller in the device uses those heavy duty cells to take over duty for normal cells that are getting more use, thereby extending the life of the device.

Now, what if it's possible for someone with knowledge of the controller to talk with the controller chip in the thumb drive and extract information about either the sectors that are getting managed as "high overwrite count" sectors, or even write counts for each sector (I assume each sector must maintain a count, or the wear levelling algorithm wouldn't know which sectors to remap)?

If such information was available, and I bet it is if you know how to talk to the controller chip, then you could easily compare the sector write frequency for each sector in the device and demonstrate that there is probably a hidden volume on this device, since there is write activity on the far end of the device in keeping with the directory structure being held there.
johnridley: (Default)
My past password theories )I was actually starting to move back towards one password everywhere (for most purposes) when today I found out about SuperGenPass. This is a little javascript applet that installs as a bookmark. You then go to a site, type in a STANDARD password that you just use everywhere, and click the bookmark. A tiny applet, which is stored INSIDE your browser, combines that password with the domain name you're logging into, and generated a random-looking password and automatically plugs it into the password field.

Since it's entirely stored on your machine, your master password never leaves the browser. Even when you're at someone else's machine and use the mobile version, it just loads the javascript locally and doesn't send anything over the wire.

Since they use the MD5 algorithm, even if a site is hacked and they find out that you used password "89vA3Baeq3" at that site, that password is useless elsewhere, and there's no way for them to know that your master password is "cricket" or whatever. End result is that you get to use a common password everywhere, but each site actually has different passwords which can't be linked to one another.

This is still vulnerable to malicious scripting and keyloggers, but then again, everything is.

February 2026

S M T W T F S
123456 7
891011 121314
15161718192021
22232425262728

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Feb. 17th, 2026 05:56 pm
Powered by Dreamwidth Studios