Главная
Study mode:
on
1
Introduction
2
Outline
3
Steganography
4
topical applications
5
Forensic Analysis Techniques
6
Essential Ingredients
7
Background
8
Vanilla Disk Encryption
9
Hidden Partition Functionality
10
Veracrypt
11
Practice
12
Problem Solution
13
Birds Eye View
14
Air Correction
15
Randomization
16
Kernel Architecture
17
In Practice
18
Takeaways
19
System Health
20
Questions
Description:
Explore the design and implementation of a self-concealing, perfectly deniable encryption/steganography suite in this 50-minute Black Hat conference talk. Delve into steganography applications, forensic analysis techniques, and essential ingredients for disk encryption. Examine vanilla disk encryption, hidden partition functionality, and Veracrypt. Learn about the problem solution, including air correction, randomization, and kernel architecture. Gain practical insights and takeaways for implementing perfectly deniable steganographic disk encryption. Presented by Dominic Schaub, this talk offers a comprehensive overview of advanced encryption techniques for data protection and privacy.

Perfectly Deniable Steganographic Disk Encryption

Black Hat
Add to list
0:00 / 0:00