LinuxSecurity Contributor writes: "The following text describes a security hole in the encrypted loop device for linux. Because of it,
an attacker is able to modify the content of the encrypted device without being detected. This text
proposes to fix the hole by authenticating the device. More at LinuxSecurity.