On Thu, Dec 12, 2013 at 15:58, Richard B. Tilley wrote:

> bioctl -c C -r number_of_rounds -l /dev/device softraid0
> 
> I have one question. Is there any way for an attacker to know how many
> rounds I passed to bioctl from the volume itself? I mean forensically,
> could that be extracted from the softraid volume? I don't think it can,
> but I have not researched this indepth or looked at the volume closely.
Of course they can. That information is written to disk. It's not a
secret. How else would bioctl know how many rounds to use when it asks
for your password the next time you attach the disk?

Reply via email to