2
I'm referring to system full disk encryption with hidden OS. Objective is to corrupt / damage the encrypted hidden volume the simplest way. Here's the scenario:
I've created system outer (decoy) volume with 500MB buffer and the hidden volume. All required programs running OK. I login outer volume to set CCleaner to wipe drive with pseudorandom (1 pass) on every startup.
Next time, if anyone or myself login outer volume, CCleaner will wipe free space automatically. Say the wipe status goes beyond 1GB free space, will the encrypted hidden volume be damaged? Has anyone tried it, 100% sure?
In theory, it should work though I've not tested it. Also, I've created my own zip bomb that can extract & occupy space up to 3GB in 1min.
I need to save several hours of testings. Hope anyone who has tried it can respond. – desperado – 2011-03-27T08:16:52.357
Just finished testing on 2 different FDE brands. Yes it works. Zip bombing and wiping free space in the outer (decoy) volume kill the encrypted hidden one. – desperado – 2011-03-31T04:33:49.873
1Questions on this site are marked solved by the owner (you) clicking the checkmark next to the solving answer (i.e. accepting the answer). The user who answered (grawity) will get a few reputation points as reward. I'll revert your edit. – Daniel Beck – 2011-03-31T05:19:17.760