Author: Liste Date: To: The Tails public development discussion list Subject: [Tails-dev] TAILS steganography proposal
I think, there is a way to hide a TAILS into a FAT32/64 USB disk/memory.
FAT32 allows some reserved sectors before the first copy of filla
allocation table.
There is a way to hide some little assembler/machine code in a
polimofric form to hide the boot loader.
Example:
A "normal" USB partition with FAT32 and TAILS hide.
The MBR can hide a little sequence to load a disk sector with the real
boot loader.
The boot loader can shuffle some code via JMPS instrucions, NOP etc...
to prevent a pattern recognition.
Into the FAT32 partitions:
1) Crate a file, then delete it with random data and rename some times.
(The data will create only into de root dir section).
This can be used to hide an encrypted partition and boot loader.
2) TAILS and the persistence can sored from in reverse order form end to
start of USB disk with encryption of boot loader.
3) Free space can be filled to rando data.
This is the similar situation used by truecrypt to hide the outer/inner
volume.
This steganography cha be used as option to hide TAILS usb.