Re: How about deniability? (read:http://www.zdnet.co.uk/print/?TYPE=story&AT=39269746-39020330t-10000025c)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>> Here user insists that /dev/hda2 is the root partition. That way all hard
>> disk space is accounted for. Attacker can prove existence of one small gpg
>> encrypted file on USB-stick for which user has forgotten passphrase.
> That just doesn't fly with for e.g. when you computer is sized by the police when you are away from home.

Obviously the police are not going to find one's USB stick on the computer, when one is not home. The stick is ONLY used for booting and then carefully hidden. It does not matter if the "self destruct" works or not, what matters is that there is absolutely no reason to even suspect that a different kind of encryption is being used on the system. It boots from the HDD and uses all the available space, and the police will get the key that will unlock the fake system, and that's it. As long as the USB stick is kept safe (which should be trivial to do), they have absolutely nothing to even suggest there being a parallel system encrypted with other keys. And as Jari pointed out, even if they actually get the USB stick too, they really cannot prove anything.

P.S. they may, however, be smart enough to type one's name on Google and find out that one has been discussing this topic on this public mailing list.


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux