[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4E1CB50A.1030509@csuohio.edu>
Date: Tue, 12 Jul 2011 16:56:42 -0400
From: Michael Holstein <michael.holstein@...ohio.edu>
To: "Thor (Hammer of God)" <thor@...merofgod.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Encrypted files and the 5th amendment
> Tim, I actually use TruCrypt now to do exactly what you speak of. I pre-allocate a fixed virtual disk, and use one passcode for one section of data and a different passcode for a different section of data. It is impossible to determine if the disk is set up in this manner, and impossible to tell which section of data is being used. It is actually quite easy to do.
>
All fine and dandy until the authorities say "Your honor, the defendant
is using nested encryption, we didn't find the
$self_incriminating_evidence so he obviously hasn't complied with our
request".
double-edged sword.
Cheers,
Michael Holstein
Cleveland State University
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists