mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
fixed spelling - updatd
This commit is contained in:
parent
eef4bd99c6
commit
188cca4495
3 changed files with 10 additions and 8 deletions
|
@ -8,7 +8,7 @@
|
|||
<meta name="author" content="">
|
||||
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
|
||||
|
||||
<title>Why Anonymity isn’t enough for Sensitive use ?</title>
|
||||
<title>Why isn't Anonymity enough for Sensitive use ?</title>
|
||||
|
||||
<!-- Bootstrap core CSS -->
|
||||
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
|
||||
|
@ -71,11 +71,12 @@
|
|||
<p>Let’s say that Bob is using a popular online forum to leak information about a government agency’s unethical behavior. To stay anonymous, he makes sure to connect to the forum using Tor at the very minimum. He uses a burner email address to sign up to the forum and upload the sensitive files. His Anonymity during this sensitive action remains intact.</p>
|
||||
<img src="1.png" class="imgRz">
|
||||
<p>However, there are only 10 people who could have originally had access to the leaked information, and Bob is one of those 10 potential suspects. </p>
|
||||
<p>The adversary makes use of the key disclosure legislation to issue search warrants to all 10 people, and to get to know the contents of their personal drives. Essentially, they don’t have anything solid against Bob, as the anonymity of the perpetrating party is intact, <b>but they are doing some guess work to try and find something incriminating anyway.</b> </p>
|
||||
<p>The adversary makes use of key disclosure legislation to issue search warrants to all 10 people, and to get to know the contents of their personal drives. Essentially, the adversary doesn’t have anything solid against any of them, since the perpetrator’s anonymity is intact, <b>but some guess work is being done to try and find something incriminating anyway.</b> </p>
|
||||
|
||||
<img src="6.png" class="imgRz">
|
||||
<p>Here’s the problem: the adversary busts down Bob’s door and <b>forces him to unlock his laptop, including every encrypted volume.</b> What happens then?</p>
|
||||
<p>Here’s the problem: the adversary can just bust down Bob’s door and <b>force him to unlock his laptop, including every encrypted volume.</b> What happens then?</p>
|
||||
<img src="../encryption/4.png" class="imgRz">
|
||||
<p><img src="../de2.png"> <b>Since Bob has no other choice but to comply when the adversary forces him to unlock his hard drives, and since e didn’t implement Deniable Encryption</b>, he has to show all the incriminating evidence, and therefore he can no longer deny implications with the sensitive activity.</p>
|
||||
<p><img src="../de2.png"> <b>Since Bob has no other choice but to comply when the adversary forces him to unlock his hard drives, and since he didn’t implement Deniable Encryption</b>, he has to show all the incriminating evidence, and therefore he can no longer deny implications with the sensitive activity.</p>
|
||||
<img src="5.png" class="imgRz">
|
||||
<p> Bob’s setup, although suitable for Anonymous Use, is not suitable for Sensitive Use <b>due to the lack of Deniable Encryption</b></p>
|
||||
<p><img src="../de0.png">For instance, if Bob had implemented <a href="../veracrypt/index.html">VeraCrypt’s deniable encryption</a> to store the sensitive data, <b>he could’ve given password A to open the decoy volume for the adversary, and could’ve claimed that there was no hidden volume. The adversary wouldn have no way to prove otherwise.</b></p>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue