On Thu, Dec 12, 2013 at 15:58, Richard B. Tilley wrote: > bioctl -c C -r number_of_rounds -l /dev/device softraid0 > > I have one question. Is there any way for an attacker to know how many > rounds I passed to bioctl from the volume itself? I mean forensically, > could that be extracted from the softraid volume? I don't think it can, > but I have not researched this indepth or looked at the volume closely.
Of course they can. That information is written to disk. It's not a secret. How else would bioctl know how many rounds to use when it asks for your password the next time you attach the disk?