Re: [PATCH] Delete cryptoloop

From: Junio C Hamano
Date: Tue Jul 27 2004 - 03:43:47 EST


>>>>> "MM" == Matt Mackall <mpm@xxxxxxxxxxx> writes:

MM> Here's a scenario: corrupt government agency secretly watermarks
MM> incriminating documents. Brave whistleblower puts them on his laptop's
MM> cryptoloop fs, but gets taken aside by customs agents on his way out
MM> of the country. Agents check his disk for evidence of the watermark
MM> and find enough evidence...

Jari's exploit uses the property that his watermarks are
encrypted to identical ciphertext blocks, but does it mean that
the technique can be used to prove that identical ciphertext are
from the watermarks and not coming from mere coincidence?

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/