If Ubuntu is installed on a second partition behind Windows, using an encrypted LVM, and /boot is on a removable drive, does that second partition just look like random data (such as DBAN would produce), or is there some identifier that indicates that it is an OS? Related to the Colorado decryption case. PD
This command can identify LUKS-encrypted partitions, as far as I'm concerned. Code: cryptsetup luksDump /dev/sdaX Encryption and stegonagraphy is two different subjects.