Permalink         13 minute read               Enclosure               24 Dec, 2019      Published  Copied to Clipboard           When i

Invisible Arch Linux

submited by
Style Pass
2021-05-31 08:00:12

Permalink 13 minute read Enclosure 24 Dec, 2019 Published Copied to Clipboard

When individuals speak of doing “big fist pumps” after their Arch installs successfully boot it can be hard to contain one’s curiosity about the path that led them there. But it’s hard to understand until you try it yourself.

In this tutorial I will show you how I repurposed the bomb I took on 30 flights to double-down on privacy using deniable encryption and how you can too.

In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny the fact that the data is encrypted or, assuming that the data is obviously encrypted, its users can convincingly deny that they are able to decrypt it. Source: cryptography.fandom.com.

While you could deniably encrypt any system the mid-2014 Mac is special because it had a battery recall. The recall repair work gave owners the perfect excuse to shred their devices using crypto-randomness prior to service. And in that randomness it’s possible to install and run an invisible operating system.

Leave a Comment