Intermezzo is a distributed file system for Linux. It was inspired
from coda but uses the disk file system as a persistent cache.
Intermezzo supports disconnected operation but does not yet
implement an identification system.
CFS pushes encryption services into the Unix(tm) file system. It
supports secure storage at the system level through a standard Unix
file system interface to encrypted files. Users associate a
cryptographic key with the directories they wish to protect. Files in
these directories (as well as their pathname components) are
transparently encrypted and decrypted with the specified key without
further user intervention; cleartext is never stored on a disk or sent
to a remote file server. CFS employs a novel combination of DES
stream and codebook cipher modes to provide high security with good
performance on a modern workstation. CFS can use any available file
system for its underlying storage without modification, including
remote file servers such as NFS. System management functions, such as
file backup, work in a normal manner and without knowledge of the key.
Access: Read/Write transparently using CBC-DES/3DES/RC5/IDEA/Others..
The main difference between TCFS and CFS is the trasparency to
user obtained by using TCFS. As a matter of fact, CFS works in
user space while TCFS works in the kernel space thus resulting
in improved performances and security.
The dynamic encryption module feature of TCFS allows a user
to specify the encryption engine of his/her choiche to be used
Currently available only for Linux, TCFS will be relased soon
also for NetBSD, and will support in a near future also other
FS then NFS.
fspatch is a kernel patch which introduces module support for the
steganographic file system (formerly known as vs3fs, an experimental
type of filesytem that not only encrypts all information on the disk,
but also tries to hide that information in such a way that it cannot be
proven to even exist on the disk. This enables you to keep sensitive
information on a disk, while not be prone to being forced to reveal that
information. Even under extreme circumstances, fake documents could be
stored on other parts of the disk, for which a pasword may be revealed.
It should not be possible to find out whether any other information is
stored on the disk.