DragonFly users List (threaded) for 2007-03
DragonFly BSD
DragonFly users List (threaded) for 2007-03
[Date Prev][Date Next]  [Thread Prev][Thread Next]  [Date Index][Thread Index]

Re: wiki log of #dragonfly irc channel

From: Helge Rohde <heroh@xxxxxx>
Date: Thu, 8 Mar 2007 21:32:23 +0000

On Wednesday 07 March 2007 19:53, Dmitri Nikulin wrote:

> All of this is entirely possible. So either you encrypt something and
> accidentally reveal the key through normal use or OS compromise, or
> you hide the key perfectly and are charged with destruction of
> evidence, which is no picnic. They'll know you did it because when the
> random seizure occurs, you'll have the encrypted files somewhere. Even
> a complete encrypted partition doesn't look like old-file noise - its
> apparent entropy is too high.
> Either way, cryptography doesn't really help you once you're under
> investigation. At best, it can help you discuss questionable issues
> without being caught by the many indiscriminate monitoring systems out
> there, but it takes a lot less than cryptography.

Which is precisly why i always envyid that windoze partition encryption 
thingy, cant remember the name now, but it provides 2 keys, one will open the 
(actual) container and another one will open another encrypted container with 
all legal and perfectly harmless files. That way they cannot crack down on 
you for destruction of evidence (what second password ? häh? no idea what you 
mean!). But afaik theres is no such thing on any of the BSD systems. Which is 
sad, because -as you point out pretty precisely - it refutes most of the 
points file/HD encryption could be useful for - They will just order you to 
give them the PW as soon as they find an encrypted Partition/File. 


[Date Prev][Date Next]  [Thread Prev][Thread Next]  [Date Index][Thread Index]