mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
Fixed typos and broken link
This commit is contained in:
parent
6eb68f0270
commit
dcf265743e
38 changed files with 88 additions and 88 deletions
|
@ -64,7 +64,7 @@
|
|||
<h1>Plausible Deniability Setup </h1>
|
||||
<img src="0.png" style="width:250px">
|
||||
<p>VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. It is based on Truecrypt, This tool will be used for Plausible Deniability. </p>
|
||||
<p>But why is Plausible Deniability important first of all ? From a legal perspective, depending on jurisdictions, you may be forced to type your password into an encrypted drive if requested. All it takes is for an adversary to be able to prove the existance of an encrypted drive to be able to force you to reveal the password to unlock it. Hence for example the regular LUKS encryption is not enough, <b>because you need to be able to deny the existance of the encrypted volume</b>. If that is the case, we have to use Veracrypt, which is an encryption tool used to provide protection (which is Plausible Deniability) against that scenario where you're forced to provide a password.</p>
|
||||
<p>But why is Plausible Deniability important first of all ? From a legal perspective, depending on jurisdictions, you may be forced to type your password into an encrypted drive if requested. All it takes is for an adversary to be able to prove the existence of an encrypted drive to be able to force you to reveal the password to unlock it. Hence for example the regular LUKS encryption is not enough, <b>because you need to be able to deny the existence of the encrypted volume</b>. If that is the case, we have to use Veracrypt, which is an encryption tool used to provide protection (which is Plausible Deniability) against that scenario where you're forced to provide a password.</p>
|
||||
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
|
@ -114,7 +114,7 @@ regarding wear leveling:
|
|||
|
||||
<p>Now from there we can create encrypted volumes (either as files or as entire drives). In this case we'll create an encrypted file: </p>
|
||||
<img src="2.png" class="imgRz">
|
||||
<p>Here we select that we want a Hidden veracrypt volume aswell (which will be able to deny it's existance).</p>
|
||||
<p>Here we select that we want a Hidden veracrypt volume as well (which will be able to deny it's existence).</p>
|
||||
<img src="3.png" class="imgRz">
|
||||
<p>Then we want it to be a simple file in my home directory</p>
|
||||
<img src="4.png" class="imgRz">
|
||||
|
@ -129,7 +129,7 @@ regarding wear leveling:
|
|||
<p>Then move your mouse to make sure the randomness of the encryption is best, then let it complete the formatting. If you are creating a large encrypted volume, it will take time to overwrite all the data. <b>DO NOT SELECT QUICK FORMAT, or you risk having the hidden volume being discoverable by an adversary.</b> </p>
|
||||
<img src="9.png" class="imgRz">
|
||||
<img src="10.png" class="imgRz">
|
||||
<p>Now that's completed, we then create the Hidden Volume, which we'll open only when we are all alone, <b>the existance of this volume must never be revealed to anyone except you.</b>. then we repeat the previous steps:</p>
|
||||
<p>Now that's completed, we then create the Hidden Volume, which we'll open only when we are all alone, <b>the existence of this volume must never be revealed to anyone except you.</b>. then we repeat the previous steps:</p>
|
||||
<img src="11.png" class="imgRz">
|
||||
<img src="12.png" class="imgRz">
|
||||
<p>Here we select the size we need for the hidden volume. </p>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue