Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Judge Orders Deleted Emails Turned Over

sirmalloc Re:Encrypt everything. (600 comments)

TrueCrypt can do this with encrypted volumes. You can have it create a hidden volume within another encrypted volume, but using a different password. You can store all your porn in the hidden volume, and all your incriminating stuff in the main volume. When forced to give up your password, give up the password to the hidden volume and they just get a load of porn. Because of the way TrueCrypt is built, it's impossible to tell that there is another volume present, or that the password given is the password to the hidden volume and not the main volume.

more than 8 years ago

Submissions

sirmalloc hasn't submitted any stories.

Journals

sirmalloc has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>