Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Encrypted files and the 5th amendment
From: Michael Holstein <michael.holstein () csuohio edu>
Date: Tue, 12 Jul 2011 16:56:42 -0400


Tim, I actually use TruCrypt now to do exactly what you speak of.   I pre-allocate a fixed virtual disk, and use one 
passcode for one section of data and a different passcode for a different section of data.   It is impossible to 
determine if the disk is set up in this manner, and impossible to tell which section of data is being used.   It is 
actually quite easy to do.
  

All fine and dandy until the authorities say "Your honor, the defendant
is using nested encryption, we didn't find the
$self_incriminating_evidence so he obviously hasn't complied with our
request".

double-edged sword.

Cheers,

Michael Holstein
Cleveland State University

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]