h a l f b a k e r yOn the one hand, true. On the other hand, bollocks.
add, search, annotate, link, view, overview, recent, by name, random
news, help, about, links, report a problem
browse anonymously,
or get an account
and write.
register,
|
|
|
A la Panic Pin, this is a technical means to foil silly customs agents. The BIOS (or EFI, whatever) of the system would have multiple passwords set, and depending on the password entered, would boot to a set partition. This way, when the TSA grunks ask you to show them your laptop, you can put in 'password'
and get your vanilla 98SE environment, replete with embarrasing wallpaper and random documents, and when you get to your secure underground bunker boot to your encrypted partition with your proprietary OS and get them all fired.
Please log in.
If you're not logged in,
you can see what this page
looks like, but you will
not be able to add anything.
Destination URL.
E.g., https://www.coffee.com/
Description (displayed with the short name and URL.)
|
|
A good idea, but they're still allowed to take an image of your entire hard drive and look at it at their leisure. |
|
|
Boot off a thumbdrive, hide it accordingly. |
|
|
Hmm, well, if the useful data was properly encrypted, an image would serve little useful purpose without inordinate effort. Failing this, I considered padding and packing the battery and hdd, and socially engineer your way around the fact that your laptop is useless (until you're reunited with your checked luggage). |
|
|
If you were capable of perfectly encrypting your hard drive, you could have an "infinite" (read all possibilities for the cardinality of the set of bits) choice of data. Keeping the data that makes the system operable, and only encrypting file data could give you lots of noise and/or a spectrum between Katy Lee Winchinsington-Smithe (aged 8) and Garry Glitter. Hiding something (plaintext) within something else (psuedo-plaintext) is called steganography. And is Baked, widely known to exist. And, funnily enough, crackable. |
|
|
Although there is merit in this idea provided there is enough take-up (up-take?). Much like the continual transmission of noise would mask a OTP transmission. |
|
|
//they're still allowed to take an image of your entire hard drive and look at it at their leisure.// They would only be prompted to do this if they were suspicious of you. |
|
| |