Re: Boot from fully encrypted disk which looks like unused

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 23/05/2011 Ð 02:13 +0200, Arno Wagner wrote:
> In practice it is basically never necessary to hide encryption.
> Either it is perfectly legal for you to refuse handing over the
> keys

That is only true if you live in a civilized country. However even in GB
there is a law that requires you to hand over the key, otherwise you are
considered as a criminal. 

> or the presence of a large, random-looking partition or file
> is already enough that they can lock you up and demand the key.

That is not necessarily the case. Assume you live in a lawful country.
They should prove that a random-looking partition contains sensible
information. There is presumption of innocence. And you always may
declare that you clean the disk from private photo, for example. However
if a partition contains an indication that it is encrypted, such as luks
header, and even prompts to enter a password, they can justly demand
this password (if there is an appropriate law).

So I still think that a bit of overhead to hide encryption may
considerably increase security.


_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux