From: +Alan Hicks+ on
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 2009-09-01, ~kurt <actinouranium(a)earthlink.net> wrote:
> The claim is also that you want to use the random number generator when
> prep'ing an encrypted hard drive so whoever is trying to decrypt it
> won't know where the data starts. I'd think one would be able to figure
> out what area had "random" data, and what had encrypted data since I
> seriously doubt the encrypted data follows the same distribution.

Provided the encryption key is suitably random and the information
doesn't have a significant amount of repeated data, I would think it
impossible to determine where the encrypted data began and ended using
the above method.

- --
It is better to hear the rebuke of the wise,
Than for a man to hear the song of fools.
Ecclesiastes 7:5
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkqddF4ACgkQNj1TaGS9H5I/+QCeO+A+vhPMuxuj1nL6MfKS5sGH
zk0AnjytuxcqWyUe6Ja+pszXAcgnavzb
=T9AI
-----END PGP SIGNATURE-----
From: ~kurt on
+Alan Hicks+ <alan(a)lizella.netWORK> wrote:
>
> Provided the encryption key is suitably random and the information
> doesn't have a significant amount of repeated data, I would think it
> impossible to determine where the encrypted data began and ended using
> the above method.

The problem is that the random number generators aren't very random. I
believe the system ones also produce a uniform distribution, which would
probably stick out like a sore thumb.

- Kurt