mirror of
https://github.com/dyne/Tomb
synced 2024-10-18 15:42:17 +00:00
documentation updates on the new cloakify feature
also updated the list of code contributors
This commit is contained in:
parent
59408b373f
commit
a0c74985ca
|
@ -5,7 +5,8 @@ LUKS extensions are written in 2006 by Clemens Fruhwirth
|
||||||
Tomb is written and maintained since 2007 by Denis Roio <jaromil@dyne.org>
|
Tomb is written and maintained since 2007 by Denis Roio <jaromil@dyne.org>
|
||||||
|
|
||||||
Tomb includes code and advices by Anathema, Boyska, Hellekin O. Wolf,
|
Tomb includes code and advices by Anathema, Boyska, Hellekin O. Wolf,
|
||||||
Daniel Rodriguez, Parazyd and Alexandre Pujol.
|
Daniel Rodriguez, Parazyd, Alexandre Pujol, AitorATuin, Narrat and
|
||||||
|
Artur Malimonov.
|
||||||
|
|
||||||
The 'gtomb' GUI based on Zenity is written by Parazyd.
|
The 'gtomb' GUI based on Zenity is written by Parazyd.
|
||||||
|
|
||||||
|
|
31
doc/tomb.1
31
doc/tomb.1
|
@ -71,8 +71,9 @@ key in its first LUKS slot.
|
||||||
.B
|
.B
|
||||||
.IP "open"
|
.IP "open"
|
||||||
Opens an existing \fItomb file\fR (first argument) using a key
|
Opens an existing \fItomb file\fR (first argument) using a key
|
||||||
(\fI-k\fR) which can also be an \fIjpeg image\fR (see
|
(\fI-k\fR) which can also be hidden inside a \fIjpeg image\fR (see
|
||||||
\fIbury\fR/\fIexhume\fR). If a second argument is given it will
|
\fIbury\fR/\fIexhume\fR) or a long text file
|
||||||
|
(see\fIcloak\fR/\fIuncloak\fR). If a second argument is given it will
|
||||||
indicate the \fImountpoint\fR where the tomb should be made
|
indicate the \fImountpoint\fR where the tomb should be made
|
||||||
accessible, else the tomb is mounted in a directory inside /media (if
|
accessible, else the tomb is mounted in a directory inside /media (if
|
||||||
not available it uses /run/media/$USER). The option \fI-o\fR can be
|
not available it uses /run/media/$USER). The option \fI-o\fR can be
|
||||||
|
@ -193,15 +194,35 @@ containing a key. If the right key password is given, the key will be
|
||||||
exhumed. If the password is not known, it is very hard to verify if a
|
exhumed. If the password is not known, it is very hard to verify if a
|
||||||
key is buried in any image or not.
|
key is buried in any image or not.
|
||||||
|
|
||||||
|
.B
|
||||||
|
.IP "cloak"
|
||||||
|
Hides a tomb key (\fI-k\fR) inside a \fIlong plain-text file\fR (first
|
||||||
|
argument) using \fIsteganography\fR: the text will change in a way
|
||||||
|
that can hardly be noticed by human eye and hardly detected by data
|
||||||
|
analysis. This option is useful to backup tomb keys in unsuspected
|
||||||
|
places; it depends from the availability of \fIcloakify\fR and
|
||||||
|
consequently \fIpython2\fR. This function does not support asymmetric
|
||||||
|
encryption using the \fI-g\fR flag.
|
||||||
|
|
||||||
|
.B
|
||||||
|
.IP "uncloak"
|
||||||
|
This command recovers from long plain-text files the keys that were
|
||||||
|
previously hidden into them using \fIcloak\fR. Cloak requires a key
|
||||||
|
filename (\fI-k\fR) and a \fIplain-text\fR file (first argument) known
|
||||||
|
to be containing a key. If the right key password is given, the key
|
||||||
|
will be exhumed. If the password is not known, it is quite hard to
|
||||||
|
verify if a key is buried in a text or not.
|
||||||
|
|
||||||
.SH OPTIONS
|
.SH OPTIONS
|
||||||
.B
|
.B
|
||||||
.B
|
.B
|
||||||
.IP "-k \fI<keyfile>\fR"
|
.IP "-k \fI<keyfile>\fR"
|
||||||
For all operations requiring a key, this option specifies the location
|
For all operations requiring a key, this option specifies the location
|
||||||
of the key file to use. Arguments can also be \fIjpeg image\fR files
|
of the key file to use. Arguments can also be \fIjpeg image\fR files
|
||||||
where keys have been hidden using the \fIbury\fR command, or text
|
where keys have been hidden using the \fIbury\fR or \fIcloak\fR
|
||||||
files retrieved from \fIengraved\fR QR codes. If the \fIkeyfile\fR
|
commands, or text files retrieved from \fIengraved\fR QR codes. If the
|
||||||
argument is "-" (dash), Tomb will read the key from stdin (blocking).
|
\fIkeyfile\fR argument is "-" (dash), Tomb will read the key from
|
||||||
|
stdin (blocking).
|
||||||
.B
|
.B
|
||||||
.IP "-n"
|
.IP "-n"
|
||||||
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
||||||
|
|
Loading…
Reference in a new issue