opsec-blogposts/anonsensitive/index.md
2025-05-06 15:58:25 +02:00

34 lines
2.3 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
author: Robert
date: 2024-06-08
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/0"
xmr: 871Hun183Cc2yXRmP4cEeUG8uiCkXfZPFQt5WVK6tCgxedWTXrpFGNTi9aRgknjYsh3jCD6iY9eyxMpGdr4xNyDNT7ZrKsK
---
# Why isnt Anonymity enough for Sensitive Use?
In this post we are going to see why Anonymity is not enough for Sensitive Use, and what can be done about it.
## **What happens when you are forced to give out your password?**
Lets say that Bob is using a popular online forum to leak information about a government agencys unethical behavior. To stay anonymous, he makes sure to connect to the forum using Tor at the very minimum. He uses a burner email address to sign up to the forum and upload the sensitive files. His Anonymity during this sensitive action remains intact.
![](1.png)
However, there are only 10 people who could have originally had access to the leaked information, and Bob is one of those 10 potential suspects.
The adversary makes use of key disclosure legislation to issue search warrants to all 10 people, and to get to know the contents of their personal drives. Essentially, the adversary doesnt have anything solid against any of them, since the perpetrators anonymity is intact, **but some guess work is being done to try and find something incriminating anyway.**
![](6.png)
Heres the problem: the adversary can just bust down Bobs door and **force him to unlock his laptop, including every encrypted volume.** What happens then?
![](../deniability/4.png)
![](../de2.png) **Since Bob has no other choice but to comply when the adversary forces him to unlock his hard drives, and since he didnt implement Deniable Encryption** , he has to show all the incriminating evidence, and therefore he can no longer deny implications with the sensitive activity.
![](5.png)
Bobs setup, although suitable for Anonymous Use, is not suitable for Sensitive Use **due to the lack of Deniable Encryption**
![](../de0.png)For instance, if Bob had implemented [VeraCrypts deniable encryption](../veracrypt/index.md) to store the sensitive data, **he couldve given password A to open the decoy volume for the adversary, and couldve claimed that there was no hidden volume. The adversary would have no way to prove otherwise.**