mirror of
https://github.com/Llewellynvdm/Tomb.git
synced 2025-01-22 22:48:24 +00:00
documentation updates on the new cloakify feature
also updated the list of code contributors
This commit is contained in:
parent
59408b373f
commit
a0c74985ca
@ -5,7 +5,8 @@ LUKS extensions are written in 2006 by Clemens Fruhwirth
|
||||
Tomb is written and maintained since 2007 by Denis Roio <jaromil@dyne.org>
|
||||
|
||||
Tomb includes code and advices by Anathema, Boyska, Hellekin O. Wolf,
|
||||
Daniel Rodriguez, Parazyd and Alexandre Pujol.
|
||||
Daniel Rodriguez, Parazyd, Alexandre Pujol, AitorATuin, Narrat and
|
||||
Artur Malimonov.
|
||||
|
||||
The 'gtomb' GUI based on Zenity is written by Parazyd.
|
||||
|
||||
|
31
doc/tomb.1
31
doc/tomb.1
@ -71,8 +71,9 @@ key in its first LUKS slot.
|
||||
.B
|
||||
.IP "open"
|
||||
Opens an existing \fItomb file\fR (first argument) using a key
|
||||
(\fI-k\fR) which can also be an \fIjpeg image\fR (see
|
||||
\fIbury\fR/\fIexhume\fR). If a second argument is given it will
|
||||
(\fI-k\fR) which can also be hidden inside a \fIjpeg image\fR (see
|
||||
\fIbury\fR/\fIexhume\fR) or a long text file
|
||||
(see\fIcloak\fR/\fIuncloak\fR). If a second argument is given it will
|
||||
indicate the \fImountpoint\fR where the tomb should be made
|
||||
accessible, else the tomb is mounted in a directory inside /media (if
|
||||
not available it uses /run/media/$USER). The option \fI-o\fR can be
|
||||
@ -193,15 +194,35 @@ containing a key. If the right key password is given, the key will be
|
||||
exhumed. If the password is not known, it is very hard to verify if a
|
||||
key is buried in any image or not.
|
||||
|
||||
.B
|
||||
.IP "cloak"
|
||||
Hides a tomb key (\fI-k\fR) inside a \fIlong plain-text file\fR (first
|
||||
argument) using \fIsteganography\fR: the text will change in a way
|
||||
that can hardly be noticed by human eye and hardly detected by data
|
||||
analysis. This option is useful to backup tomb keys in unsuspected
|
||||
places; it depends from the availability of \fIcloakify\fR and
|
||||
consequently \fIpython2\fR. This function does not support asymmetric
|
||||
encryption using the \fI-g\fR flag.
|
||||
|
||||
.B
|
||||
.IP "uncloak"
|
||||
This command recovers from long plain-text files the keys that were
|
||||
previously hidden into them using \fIcloak\fR. Cloak requires a key
|
||||
filename (\fI-k\fR) and a \fIplain-text\fR file (first argument) known
|
||||
to be containing a key. If the right key password is given, the key
|
||||
will be exhumed. If the password is not known, it is quite hard to
|
||||
verify if a key is buried in a text or not.
|
||||
|
||||
.SH OPTIONS
|
||||
.B
|
||||
.B
|
||||
.IP "-k \fI<keyfile>\fR"
|
||||
For all operations requiring a key, this option specifies the location
|
||||
of the key file to use. Arguments can also be \fIjpeg image\fR files
|
||||
where keys have been hidden using the \fIbury\fR command, or text
|
||||
files retrieved from \fIengraved\fR QR codes. If the \fIkeyfile\fR
|
||||
argument is "-" (dash), Tomb will read the key from stdin (blocking).
|
||||
where keys have been hidden using the \fIbury\fR or \fIcloak\fR
|
||||
commands, or text files retrieved from \fIengraved\fR QR codes. If the
|
||||
\fIkeyfile\fR argument is "-" (dash), Tomb will read the key from
|
||||
stdin (blocking).
|
||||
.B
|
||||
.IP "-n"
|
||||
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
||||
|
Loading…
x
Reference in New Issue
Block a user