To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Cryptoloop is a Linux kernel's disk encryption module that relies on the Crypto API, which is a cryptography framework introduced in version 2.5.45 of the Linux kernel mainline.[1] Cryptoloop was first introduced in the 2.5.x kernel series; its functionality was later incorporated into the device mapper, a generic framework used to map one block device onto another.

Cryptoloop can create an encrypted file system within a partition or from within a regular file in the regular file system. Once a file is encrypted, it can be moved to another storage device. This is accomplished by making use of a loop device, a pseudo device that enables a normal file to be mounted as if it were a physical device. By encrypting I/O to the loop device, any data being accessed must first be decrypted before passing through the regular file system; conversely, any data being stored will be encrypted.

Cryptoloop is vulnerable to watermarking attacks,[2] making it possible to determine presence of watermarked data on the encrypted filesystem:

This attack exploits weakness in IV computation and knowledge of how file systems place files on disk. This attack works with file systems that have soft block size of 1024 or greater. At least ext2, ext3, reiserfs and minix have such property. This attack makes it possible to detect presence of specially crafted watermarked files. Watermarked files contain special bit patterns that can be detected without decryption.[3]

Newer versions of cryptoloop's successor, dm-crypt, are less vulnerable to this type of attack if used correctly.[4]

YouTube Encyclopedic

  • 1/3
    Views:
    706
    556
    2 151
  • CRYPTODELICS.COM REVIEW | 100% SCAM
  • Cryptodelics.com Week 2 Review : I Made Money and LOST Money : (
  • [STOP] HYIP Bitrade [Scam???]

Transcription

See also

References

  1. ^ "Kernel development". LWN.net. October 2002. Retrieved 2015-02-15.
  2. ^ SecuriTeam (2005-05-26). "Linux Cryptoloop Watermark Exploit". Retrieved 2006-08-09.
  3. ^ Saarinen, Markku-Juhani O. (2004-02-19). "'Re: Oopsing cryptoapi (or loop device?) on 2.6.*' - MARC". Retrieved 2017-06-04.
  4. ^ Markus Reichelt (2004-06-20). "Why Mainline Cryptoloop Should Not Be Used". Retrieved 2017-06-04.

External links


This page was last edited on 29 December 2020, at 18:30
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.