warmfuzzy wrote to All <=-
Another layer of security would be using VeraCrypt to encrypt the whole microSD cards entire file systems with its AES-256 crypto. By using VeraCrypt to secure the entire chips it would appear to be completely random data on there, and since it is done without a standard file
system there is no forensic way to determine how many items, if any
items at all, are on that chip, except that there is PRNG data for whatever reason on it.
You just have to make sure you mark them inconspicuously as WDE drives,
otherwise you might insert it, see the "uninitialized disk, FORMAT
NOW?" message and hit Y. Don't ask me how I know.
I think ordering a specific brand for crypt work might be subtle but
apparent to you.
On encrypted hard drives, I usually write BAD SECTORS or the name of a
virus on it.
Oh, crap, I suppose I need to find another code now.
"KELLY CLARKSON MUSIC VIDEOS"
This could be excused by saying that the chip
was securely deleted, which would produce the same look in examining
the results. So there is plausible deny-ability, and using hidden volumes, a feature of VeraCrypt, it is possible to have yet another
level of plausible deny-ability.
This is the most elite file storage device using commericial-grade technology ever released to the public, and anyone can do it, even you.
Just don't be Evil.
Cheers!
-warmfuzzy
--- Mystic BBS v1.12 A49 2023/04/30 (Linux/64)
* Origin: thE qUAntUm wOrmhOlE, rAmsgAtE, uK. bbs.erb.pw (700:100/37)
... Keith spoke in ALPHANUMERALS
--- MultiMail/Win v0.52
* Origin: realitycheckBBS.org -- information is power. (700:100/20)