Re: How about deniability? (read:http://www.zdnet.co.uk/print/?TYPE=story&AT=39269746-39020330t-10000025c)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Michael Garibaldi wrote:
> Obviously the police are not going to find one's USB stick on the
> computer, when one is not home. The stick is ONLY used for booting and
> then carefully hidden. It does not matter if the "self destruct" works
> or not, what matters is that there is absolutely no reason to even
> suspect that a different kind of encryption is being used on the
> system. It boots from the HDD and uses all the available space, and
> the police will get the key that will unlock
> the fake system, and that's it. As long as the USB stick is kept safe
> (which should be trivial to do), they have absolutely nothing to even
> suggest there being a parallel system encrypted with other keys. 

The timestamps will show that the files weren't accessed for months or
even years. And there are also all those logfiles in /var/log which
include dates. I think there will be enough proof that the system wasn't
can't be the system you are normally using.

-- 
Thomas Weinbrenner

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux