diff --git a/opsec/encryption/index.html b/opsec/encryption/index.html index a6e31a9..cb1fbce 100644 --- a/opsec/encryption/index.html +++ b/opsec/encryption/index.html @@ -104,6 +104,8 @@ The door is closed, the conversation remains between Alice and Bob, their conver
in January 2012 (source)
in Febuary 2009 (source)
Now here there are multiple scenarios. Either you live in a country that doesn't respect human rights, and they torture you until you spit out the password, or the country you live in has to respect human rights, they throw you in jail for let's say 6 months, for contempt of court (arguing that you swore to tell the truth, and you lied about having forgotten your password), which is also an attempt to break your will, to make you spit out the password. the only problem is that they can't legally torture you any other way, so they have no other option than to do it like that.
+If you are ever dragged into court, the judge will appreciate much more if you actually hand over your laptop, and show that you are willing to cooperate with the authorities by providing your password to unlock it, rather than starting to pretend you forgot your password (which can end badly like in this court case, where the defendant was found to be in contempt of court, and thrown in jail for 6 months for it),
When that is the case, simply encrypting the disk is not enough, as all that is required is for the adversary to know of the existance of the encrypted drive, to be able to force Bob to open it
As far as key encryption laws, the trend is that most developed countries are forcing their citizens to incriminate themselves and to surrender the encryption keys to authorities, when asked. In short,If the encrypted volume is proven to exist, you can be forced to surrender the decryption key/password to open it.