mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
added deniability scenarios
This commit is contained in:
parent
64e12ef3be
commit
6d2b113ed2
1 changed files with 2 additions and 0 deletions
|
@ -104,6 +104,8 @@ The door is closed, the conversation remains between Alice and Bob, their conver
|
||||||
<li><p>in January 2012 (<a href="https://www.wired.com/2012/01/judge-orders-laptop-decryption/">source</a>)</p></li>
|
<li><p>in January 2012 (<a href="https://www.wired.com/2012/01/judge-orders-laptop-decryption/">source</a>)</p></li>
|
||||||
<li><p>in Febuary 2009 (<a href="https://www.cnet.com/tech/tech-industry/judge-orders-defendant-to-decrypt-pgp-protected-laptop/">source</a>)</p></li>
|
<li><p>in Febuary 2009 (<a href="https://www.cnet.com/tech/tech-industry/judge-orders-defendant-to-decrypt-pgp-protected-laptop/">source</a>)</p></li>
|
||||||
</ol>
|
</ol>
|
||||||
|
<p>Now here there are multiple scenarios. Either you live in a country that doesn't respect human rights, and they torture you until you spit out the password, or the country you live in has to respect human rights, they throw you in jail for let's say 6 months, for contempt of court (arguing that you swore to tell the truth, and you lied about having forgotten your password), <b>which is also an attempt to break your will, to make you spit out the password.</b> the only problem is that they can't legally torture you any other way, so they have no other option than to do it like that.</p>
|
||||||
|
<p>If you are ever dragged into court, <b>the judge will appreciate much more if you actually hand over your laptop, and show that you are willing to cooperate with the authorities by providing your password to unlock it</b>, rather than starting to pretend you forgot your password (which can end badly like in <a href="https://lawblog.legalmatch.com/2018/07/23/florida-man-jailed-allegedly-forgetting-password-on-cell-phones/">this court case</a>, where the defendant was found to be in contempt of court, and thrown in jail for 6 months for it), </p>
|
||||||
<p>When that is the case, simply encrypting the disk is not enough, as <b>all that is required is for the adversary to know of the existance of the encrypted drive, to be able to force Bob to open it</b></p>
|
<p>When that is the case, simply encrypting the disk is not enough, as <b>all that is required is for the adversary to know of the existance of the encrypted drive, to be able to force Bob to open it</b></p>
|
||||||
<img src="6.png" class="imgRz">
|
<img src="6.png" class="imgRz">
|
||||||
<p>As far as key encryption laws, the trend is that most developed countries are forcing their citizens to incriminate themselves and to surrender the encryption keys to authorities, when asked. In short,<b>If the encrypted volume is proven to exist, you can be forced to surrender the decryption key/password to open it.</b></p>
|
<p>As far as key encryption laws, the trend is that most developed countries are forcing their citizens to incriminate themselves and to surrender the encryption keys to authorities, when asked. In short,<b>If the encrypted volume is proven to exist, you can be forced to surrender the decryption key/password to open it.</b></p>
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue