DragonFly users List (threaded) for 2007-03
Re: wiki log of #dragonfly irc channel
On Wednesday 07 March 2007 19:53, Dmitri Nikulin wrote:
> All of this is entirely possible. So either you encrypt something and
> accidentally reveal the key through normal use or OS compromise, or
> you hide the key perfectly and are charged with destruction of
> evidence, which is no picnic. They'll know you did it because when the
> random seizure occurs, you'll have the encrypted files somewhere. Even
> a complete encrypted partition doesn't look like old-file noise - its
> apparent entropy is too high.
> Either way, cryptography doesn't really help you once you're under
> investigation. At best, it can help you discuss questionable issues
> without being caught by the many indiscriminate monitoring systems out
> there, but it takes a lot less than cryptography.
Which is precisly why i always envyid that windoze partition encryption
thingy, cant remember the name now, but it provides 2 keys, one will open the
(actual) container and another one will open another encrypted container with
all legal and perfectly harmless files. That way they cannot crack down on
you for destruction of evidence (what second password ? häh? no idea what you
mean!). But afaik theres is no such thing on any of the BSD systems. Which is
sad, because -as you point out pretty precisely - it refutes most of the
points file/HD encryption could be useful for - They will just order you to
give them the PW as soon as they find an encrypted Partition/File.