Search Mailing List Archives
[liberationtech] Espionge.app's lack of plausible deniability (Was: TrueCrypt Alternatives?)
greg at kinostudios.com
Mon Oct 6 13:52:12 PDT 2014
On Oct 6, 2014, at 9:48 AM, Steve Weis <steveweis at gmail.com> wrote:
> Hello Greg. I tried out Espionage.app and it was easy to distinguish
> real encrypted images from fake images via filesystem metadata. I
> don't think Espionage offers any realistic notion of plausible
> deniability, especially against "totalitarian regimes" as the webpage
Espionage manipulates the filesystem metadata for sparsebundles, so it's unclear to me whether you actually were able to distinguish them or not, but if you were, please send an email to contact at taoeffect.com with your results and we'll fix it!
Thanks for having a look.
Please do not email me anything that you are not comfortable also sharing with the NSA.
> This took no special skills and only a few minutes to find. Someone
> who knows more about disk forensics or the journaled filesystem can
> likely recover much more detailed usage information. I'm also suspect
> of Espionage's internal database leaking information, but did not look
> at it closely.
> On Sat, Sep 27, 2014 at 7:15 PM, Greg <greg at kinostudios.com> wrote:
>> I work for Tao Effect LLC, our software is on that list, and you can read
>> about how its plausible deniability compares to TrueCrypt's here...
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the liberationtech