Silk Road forums
Discussion => Security => Topic started by: White 0ut on February 20, 2013, 12:50 am
-
Title says most of it. I am wanting to take off ANY SR related things, Tor, PL's Coupons, anything. All while keeping my other original files. I would then like some advice on how to encrypt a USB properly with TrueCrypt. +REP to whoever answers.
Will this complete the hardware end of anonymity for me? I obviously am not new to SR just wanting to make sure my hardware is in check!
-
well i have no problem with this but you might be able to do this, in the beginning i crypted everything on truecrypt and then i formated my computer so i felt secure now, i have a different laptop set up, with no HDD and i juse a portable encrypted hardrive to run an os, might be a bit more money put sure to keep you safe
-
well i have no problem with this but you might be able to do this, in the beginning i crypted everything on truecrypt and then i formated my computer so i felt secure now, i have a different laptop set up, with no HDD and i juse a portable encrypted hardrive to run an os, might be a bit more money put sure to keep you safe
I have another laptop I can use but it runs tor slow. I am planning on cleaning all my computers to stock besides my saved stuff, then using TrueCrypt on a new usb flash drive 14gigs. Then I will boot Tor from the drive on any computer I want right?
Wont this do the job safely? I would rather have a clean slate and not have to worry about encrypting the whole computer...
What do you mean by format?
How do I do that and keep everything but undesired files?
-
Also probably more of a n00b question but wtf are liberte & tails? I thought using TOR was enough to safely order as far as browser anonymity?
-
What operating system are you on? Are you using a HDD or a SSD? have you ever had sensitive things unencrypted on your drives?
If you are on windows you could just do FDE with Truecrypt, it overwrites what is on your drive with an encrypted version of it, possibly/probably not as safe as doing Secure Erase of the entire drive and encrypting it first thing, but it is most likely fine. If you have a SSD and it has ever had sensitive information on it in a non-encrypted format, you are fucked because of wear leveling. SSD need to be encrypted first thing or else they are insecure as soon as they have anything sensitive on them that is not encrypted. Same goes for your USB drive as well, if it is fresh or never has had anything sensitive on it you should just encrypt it with Truecrypt, otherwise you should probably toss it honestly. If you are on Linux it is much easier to encrypt at install time than later on, but you can still configure FDE from in an already installed OS. I have never done it except at install time , but I can probably find a tutorial and walk you through it if it is a requirement of yours.
-
by that i mean resinstalling your OS, and to keep the files you do want, simply upload them to a FTP server and then just download the client again and u have access to your files, WALLAH
-
What operating system are you on? Are you using a HDD or a SSD? have you ever had sensitive things unencrypted on your drives?
If you are on windows you could just do FDE with Truecrypt, it overwrites what is on your drive with an encrypted version of it, possibly/probably not as safe as doing Secure Erase of the entire drive and encrypting it first thing, but it is most likely fine. If you have a SSD and it has ever had sensitive information on it in a non-encrypted format, you are fucked because of wear leveling. SSD need to be encrypted first thing or else they are insecure as soon as they have anything sensitive on them that is not encrypted. Same goes for your USB drive as well, if it is fresh or never has had anything sensitive on it you should just encrypt it with Truecrypt, otherwise you should probably toss it honestly. If you are on Linux it is much easier to encrypt at install time than later on, but you can still configure FDE from in an already installed OS. I have never done it except at install time , but I can probably find a tutorial and walk you through it if it is a requirement of yours.
Windows/HP/HDD/ ----
USB is brand new, planned on encrypting with TrueCrypt..
Is it necessary to encrypt your whole computer instead of just your flash drive? I feel this would look suspicious if any questioning starts for any reason down the road. (No pun intended) If it's necessary Idc to do it but if not I want to stay with the flash drive, so it's portable from PC to PC..
I think for my wiping situation I will go for what BF posted. Uploading everything good to a FTP and then wiping clean the bad, then bringing back the clean! Is this safe? Also What are the steps for formatting to normal. I am not computer illiterate as it must sound I am just not very familiar with encryption and reformatting/wiping.
Also wtf are tails and liberte
-
tails is a usb bootable form of TOR and i personally dont use liberte but i asume its the same?
and nothing is trully necessary but you cant ever be to sure, and all you need to reinstall your OS is a cd corresponding with the OS u want, weather it be vista ,7,8 or xp and a product key for it, which i guessign you already have seeing how u have windows, if you dont have the installation disk, contact your computers manufacture and ask for it, it cost around 30-40
-
Who cares if it looks suspicious, it isn't illegal to look suspicious and you can't go to jail for having an encrypted hard drive. If you ever go to court and they ask why you wont give up your encryption keys, after consulting with your lawyer, tell them that you plead the fifth. That cannot be used to determin
-
hes got his tin foil hat on
-
Me? Nah not my tin-foil hat but more like my tin-foil eye patch! Haha, no really man I am just educating myself. It's not like " I HAVE TO HAVE THESE DEA HAZ ALL MY BASE" But it's just something I'd like to be reasonably familiar with!
-
ha, i feel ya bro, but ur right though, you can never be to sure, if ur really that worried buy a small netbook, and use it specificly for blackmerket things, and tht way u can hide it anywhere and carry it anywhere
-
Little guide if you use win7:
Download Truecrypt and then cut off internet connection. (in case your system is already compromised)
1. Create a truecrypt volume on a usb-drive. (use a good password, https://review.datenschutz.ch/passwortcheck/check.php ; the volume should big enough for your important data)
Creating a New TrueCrypt Volume:
To create a new TrueCrypt file-hosted volume or to encrypt a partition/device (requires administrator privileges), click on 'Create Volume' in the main program window.
TrueCrypt Volume Creation Wizard should appear. As soon as the Wizard appears, it starts collecting data that will be used in generating the master key, secondary key (XTS mode), and salt, for the new volume. The collected data, which should be as random as possible, include your mouse movements, key presses, and other values obtained from the system (for more information, please see the section Random Number Generator). The Wizard provides help and information necessary to successfully create a new TrueCrypt volume. However, several items deserve further explanation:
http://www.truecrypt.org/docs/creating-new-volume
2. copy your important data to the mounted volume, unmount the volume.
3. download: http://www.dban.org/download , burn to CD and boot from it. wipe all harddiskdrives.
4. Install new win7, get all updates, don't install warez, install truecrypt and set up full disk encryption: http://www.youtube.com/watch?v=_ttbtGTlOTA
5. set up windows firewall to block all connections that are not on the list of allowed programs: http://windows.microsoft.com/en-US/windows7/Understanding-Windows-Firewall-settings
6. for normal browsing the web only use firefox with no-script, better privacy addons, use duckduckgo instead of google. don't install flash, silverlight, java
7. install microsoft security essentials and click under settings ->MAPS -> i don't want to join MAPS
8. If you use a notebook, you can set a boot and hdd password in BIOS! Also disable firewire and esata in BIOS!
And never use standby mode! ( http://www.hermann-uwe.de/blog/physical-memory-attacks-via-firewire-dma-part-1-overview-and-mitigation )
-
Little guide if you use win7:
Download Truecrypt and then cut off internet connection. (in case your system is already compromised)
1. Create a truecrypt volume on a usb-drive. (use a good password, https://review.datenschutz.ch/passwortcheck/check.php ; the volume should big enough for your important data)
Creating a New TrueCrypt Volume:
To create a new TrueCrypt file-hosted volume or to encrypt a partition/device (requires administrator privileges), click on 'Create Volume' in the main program window.
TrueCrypt Volume Creation Wizard should appear. As soon as the Wizard appears, it starts collecting data that will be used in generating the master key, secondary key (XTS mode), and salt, for the new volume. The collected data, which should be as random as possible, include your mouse movements, key presses, and other values obtained from the system (for more information, please see the section Random Number Generator). The Wizard provides help and information necessary to successfully create a new TrueCrypt volume. However, several items deserve further explanation:
http://www.truecrypt.org/docs/creating-new-volume
2. copy your important data to the mounted volume, unmount the volume.
3. download: http://www.dban.org/download , burn to CD and boot from it. wipe all harddiskdrives.
4. Install new win7, get all updates, don't install warez, install truecrypt and set up full disk encryption: http://www.youtube.com/watch?v=_ttbtGTlOTA
5. set up windows firewall to block all connections that are not on the list of allowed programs: http://windows.microsoft.com/en-US/windows7/Understanding-Windows-Firewall-settings
6. for normal browsing the web only use firefox with no-script, better privacy addons, use duckduckgo instead of google. don't install flash, silverlight, java
7. install microsoft security essentials and click under settings ->MAPS -> i don't want to join MAPS
8. If you use a notebook, you can set a boot and hdd password in BIOS! Also disable firewire and esata in BIOS!
And never use standby mode! ( http://www.hermann-uwe.de/blog/physical-memory-attacks-via-firewire-dma-part-1-overview-and-mitigation )
Do you have a similar "guide" for mac or linux?
Might be good to make one post about it - with the "guide" for each type of OS (some mod might even wanna "stick" it).
-
Hey all! Thanks for all the great answers. I just found out I am getting a new macbook air and this will be a computer I use SR on. What precautions should be taken for the SSD?
-
TAILS and Liberte are two linux distros geared towards anonymity and security. They're very similar. I prefer Liberte for disk installs and TAILS for LiveCD/USB use.
Basically they are:
Non-persistent. Every time you reboot the system it's back to scratch. Nothing is saved on the disk where LE could forensically recover.
That said, they both offer the OPTION to create a persistent area on the USB or HD. The OS is still running from RAM and starting from scratch each reboot, but the persistent encrypted store allows things like GPG keys, apt-get packages, etc.
ALL network traffic is directed over Tor. Nothing goes over the clear net.
Includes most security software, GPG etc.
Highly patched and security audited.
I have an SR oriented laptop listing:
Custom Security-Hardened Dual-Boot Thinkpad E535
http://silkroadvb5piz3r.onion/silkroad/item/1b52d9a7e4
Not trying to push my wares on you, but if you read the item description you may get some ideas for securing your own system.
-
If you were to have a completely different computer for using TOR and SR to buy and sell drugs, would it matter than you lurked around on SR on another main computer? I mean you've done nothing illegal by browsing the sites and no information on the site links the computer to misbehaving or selling drugs, would it matter if that information was on the computer? Even when the new computer is fully encrypted and pretty undetectable?
-
what i would like to know is how do the feds recover data from the HDD? what software do they use? it perplexes me? any1?
-
Both very good questions! Anyone know anything about safely using a SSD
-
what i would like to know is how do the feds recover data from the HDD? what software do they use? it perplexes me? any1?
Both very good questions! Anyone know anything about safely using a SSD
@White 0ut: Im not very educated on the tech ith SSD's and their data retention, however, I have read in a few threads on here by some serious computer gurus, that SSD's are among the WORST drives to use if u want to wipe data off and be 100% certain it cant be pulled back out. Even using something like Eraser. As far as I remember, it had something to do with the "cluster tips" on SSD drives not being able to be fully overwrittin and/or encrypted, meaning you cna never know that ALL the data on the drive was wiped, even though it says the drive has been/is 100% empty after the wipe.
@username10: As with my previous statement, im not 100%, but again, while researching said threads I mentioned above, people were saying that its not just a software thing. Thats their first stage to see if they can easily and quikly get the ifno back. But if they cant find anything through that and they are looking for a big enough charge against you, the hard drives are dissasembled, components are removed and plugged into other types of PC board/electronic componenets that allow the forensic teams to then start going into the actual physical electronic components on the drive to search for left over data.
Mate, like I said before, the only way that its possibel for a previous SR user thats been just using their everyday pc and mounting truecrypt USB's etc, to be 100% at piece of mind, is to DESTROY the drives and dispose of them as per my instructions on the previous page. Theres a reason high end server/networking based companies use this exact method for getting rid of hard drives. And they just do that because of sensitive client and company info, which is purely legal.....If they go through those steps jsut to make sure something as simple as identity theft cannot happen as a result of hard drives being obtained through the trash or through recycling depots, Im sure you can see why taking these same steps with something like SR activity is not really too much of a stretch.
The best part of doing this, and moving to a live dvd system, is that form that day that those drives are destroyed and disposed of. If your house was raided, you could sit in an interrigation room KNOWING with 10000% certainty they got jack shit except posession. IMHO, a weekend of working on your computer and spending about the same amount of money as would get you an oz of weed. Is well fucking worth it...
S
-
Little guide if you use win7:
Download Truecrypt and then cut off internet connection. (in case your system is already compromised)
1. Create a truecrypt volume on a usb-drive. (use a good password, https://review.datenschutz.ch/passwortcheck/check.php ; the volume should big enough for your important data)
Creating a New TrueCrypt Volume:
To create a new TrueCrypt file-hosted volume or to encrypt a partition/device (requires administrator privileges), click on 'Create Volume' in the main program window.
TrueCrypt Volume Creation Wizard should appear. As soon as the Wizard appears, it starts collecting data that will be used in generating the master key, secondary key (XTS mode), and salt, for the new volume. The collected data, which should be as random as possible, include your mouse movements, key presses, and other values obtained from the system (for more information, please see the section Random Number Generator). The Wizard provides help and information necessary to successfully create a new TrueCrypt volume. However, several items deserve further explanation:
http://www.truecrypt.org/docs/creating-new-volume
2. copy your important data to the mounted volume, unmount the volume.
3. download: http://www.dban.org/download , burn to CD and boot from it. wipe all harddiskdrives.
4. Install new win7, get all updates, don't install warez, install truecrypt and set up full disk encryption: http://www.youtube.com/watch?v=_ttbtGTlOTA
5. set up windows firewall to block all connections that are not on the list of allowed programs: http://windows.microsoft.com/en-US/windows7/Understanding-Windows-Firewall-settings
6. for normal browsing the web only use firefox with no-script, better privacy addons, use duckduckgo instead of google. don't install flash, silverlight, java
7. install microsoft security essentials and click under settings ->MAPS -> i don't want to join MAPS
8. If you use a notebook, you can set a boot and hdd password in BIOS! Also disable firewire and esata in BIOS!
And never use standby mode! ( http://www.hermann-uwe.de/blog/physical-memory-attacks-via-firewire-dma-part-1-overview-and-mitigation )
Do you have a similar "guide" for mac or linux?
Might be good to make one post about it - with the "guide" for each type of OS (some mod might even wanna "stick" it).
Well, those were just a few thoughts, if he really wants to use Windows 7 and how he can wipe his PC's.
"clean Windows 7 + Truecrypt" may be safe enough against LE in some european countrys and for a "personal consume buyer".
But if I would live in the USA or Iran i would definitely (even for personal consume buys) use a cheap second hand notebook (maybe a Dell D430) in combination with Tails for SR only.
Little guide:
1. Buy a cheap little notebook like a Dell D430, pay cash
2. Buy a 4-8GB usb-stick (maybe read some tests and buy a fast one (read/write speeds), not the cheapest)
3. Download: http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/
4. Download newest Tails version (check checksum of the iso (tails site explain it), check regulary for new versions and do 5.+6. again)
5. Use the installer above to create a Tails usb stick
6. boot your cheap little and cute notebook from the tails usb stick and maybe create a encrypted persistant storage on the intern harddrive. (also set up boot and harddiskdrive passwords in bios)
Tin foil mode: Buy (also with cash) a UMTS stick or card and use prepaid cards for internet connections only.
And if you do so, don't browse from your home. (maybe drive with a bus through your city)
Again: That's just a basic concept and you should research more on your own.
For OS-X Lion or Mountain Lion: Activate Filevault 2 and dont't share the key with Apple! (they will ask in the wizard)
Optionally buy http://www.obdev.at/products/littlesnitch/index-en.html and deny every suspicious connection. (much things/processes you have to research)
-
what i would like to know is how do the feds recover data from the HDD? what software do they use? it perplexes me? any1?
For simple cases, Encase is forensics software that can be used for viewing deleted data. When you delete a file, it is not really gone from the drive, rather it is simply not indexed anymore and the space it is taking up can be overwritten by other files. However, it can take a long time before anything is written over the file, so even many years later a deleted file can be recovered with Encase. In more difficult cases, someone might try to physically destroy their platter by smashing it into a bunch of pieces or otherwise doing physical damage to it. In these cases they reconstruct the platter from its pieces and use spin stand microscopy, which essentially uses a magnetic microscope to read from the platter pieces, which are placed on a spinning stand to mimic the platter rotation. Even more advanced recovery may attempt to gather data fragments from the edge of a platters track , that is why Secure Erase puts the magnetic head slightly off track during its second pass. It may be possible to recover some data even if the drive is written over, unless magnetic residue on the track edge is taken care of. I read a study about data recovery from edge residue once, but I cannot remember the conclusion it came to. I imagine it is a real concern though, as Secure Erase attempts to counter it. For extremely advanced stuff, In the past there was a theoretical paper written about using magnetic force variance measurements to try to determine the history of a given bit on the platter, in order to recover overwritten data. The infamous 35 pass guttman wipe was designed to overcome this. On modern drives this is widely thought to be a non-issue due to greatly increased platter density, also I am not certain if this technique has ever actually been used in practice or if it has been confined entirely to the realm of theory. Even in the forensic data recovery world there is a bit of debate regarding this technique, some people seem to think it is valid but I have also seen others saying it simply does not work and is a myth. I am not worried about it anyway :).
-
what i would like to know is how do the feds recover data from the HDD? what software do they use? it perplexes me? any1?
For simple cases, Encase is forensics software that can be used for viewing deleted data. When you delete a file, it is not really gone from the drive, rather it is simply not indexed anymore and the space it is taking up can be overwritten by other files. However, it can take a long time before anything is written over the file, so even many years later a deleted file can be recovered with Encase. In more difficult cases, someone might try to physically destroy their platter by smashing it into a bunch of pieces or otherwise doing physical damage to it. In these cases they reconstruct the platter from its pieces and use spin stand microscopy, which essentially uses a magnetic microscope to read from the platter pieces, which are placed on a spinning stand to mimic the platter rotation. Even more advanced recovery may attempt to gather data fragments from the edge of a platters track , that is why Secure Erase puts the magnetic head slightly off track during its second pass. It may be possible to recover some data even if the drive is written over, unless magnetic residue on the track edge is taken care of. I read a study about data recovery from edge residue once, but I cannot remember the conclusion it came to. I imagine it is a real concern though, as Secure Erase attempts to counter it. For extremely advanced stuff, In the past there was a theoretical paper written about using magnetic force variance measurements to try to determine the history of a given bit on the platter, in order to recover overwritten data. The infamous 35 pass guttman wipe was designed to overcome this. On modern drives this is widely thought to be a non-issue due to greatly increased platter density, also I am not certain if this technique has ever actually been used in practice or if it has been confined entirely to the realm of theory. Even in the forensic data recovery world there is a bit of debate regarding this technique, some people seem to think it is valid but I have also seen others saying it simply does not work and is a myth. I am not worried about it anyway :).
Very inormative post. Thanks a lot for that, going to look into the things oyu mentioned. However, for us that are buying personal use amounts, and not ordering 10 orders a week kinda thing, I doubt that a suspected SR user is going to be subject to that kind of forensic probing. If you read my post above on how proffesional server companies destroy of their drives, if a SR USER that wants to wipe the slate clean follows that, theyre guarunteed to be fine. If your a high up vendor on here and they finally trac you down and raid you, then I could see that kinda tech and budget being put into the investigation. Crazy info though.....Amazing how well hard drives retain data, relative to how new this world of computers is (not to harp on relativity but computers and electronics are really fucking new in the grand scheme of recorded history).
You guys seen the new tehcnology that allows something in the realm of millions or 10's of millions of times the data in the same surface area as a standard CD/DVD......Theyre creating synthetic DNA, and using it to store digital information that a computer can then read from. Theyve successfully stored a speach by martin luther king, a photo of the Lab they first made te discovery in, some classic book and I think some music. Freaking insane.....
-
@Sulsta @kmfkewm @tempo @eddiethegun
Thanks fella's all very awesome responses. So I would like some more situation specific advice if that's cool...
I have a old laptop that I can use as my SR only computer and encrypt it after all of this...
I have accessed SR on 4 different computers, all PC's.... I know I know this is shitty but my internet hasn't been reliable place to place. All of these are owned by loved ones unfortunately. Making purchases and storing files (besides Tor, txt, ect) from only 2/4..... Ill go down the list
-My soon to be SR only Laptop (Browsing/Posting only so far)
-My Home Laptop (Purchased from)
-My other home's Computer (Purchased From)
-Another relatives computer (only downloaded tor and browsed/posted)
My (other home computer and STB SR laptop have the same actual IP)
My Q's
1. If I only browsed on them will deleting Tor and a system wipe be efficient since I didn't actually do anything from my relatives PC but download and browse. (relatives PC)
2. (My other Homes Computer) this is absolutely essential for me to get clean! I have downloaded Tor, made orders, posted, and downloaded some coupons to this PC so a clean slate is needed. Do I absolutely have to trash it? Its got around 600gigs of memory. Thats not cheap to replace but I will spend the $ if I must.
3.(My home laptop) this one is also crucial for me to get clean, however this is a cheap ass laptop that I would not have a problem trashing after I got my needed files of course. So I would basically take out the HD after I have backed up all my crucial photos ect an and then trash it? I can keep the laptop and it's clean?
So if I can get these three answered I am ready to start my cleanup and then proceed with encryption. The biggest problem is (my other homes computer) as it should not have any trace whatsoever since it will be kept and used for a legitimate business.
Thanks all
-W0
-
@Sulsta @kmfkewm @tempo @eddiethegun
My Q's
1. If I only browsed on them will deleting Tor and a system wipe be efficient since I didn't actually do anything from my relatives PC but download and browse. (relatives PC)
2. (My other Homes Computer) this is absolutely essential for me to get clean! I have downloaded Tor, made orders, posted, and downloaded some coupons to this PC so a clean slate is needed. Do I absolutely have to trash it? Its got around 600gigs of memory. Thats not cheap to replace but I will spend the $ if I must.
3.(My home laptop) this one is also crucial for me to get clean, however this is a cheap ass laptop that I would not have a problem trashing after I got my needed files of course. So I would basically take out the HD after I have backed up all my crucial photos ect an and then trash it? I can keep the laptop and it's clean?
So if I can get these three answered I am ready to start my cleanup and then proceed with encryption. The biggest problem is (my other homes computer) as it should not have any trace whatsoever since it will be kept and used for a legitimate business.
Thanks all
-W0
Answers:
1: Absolutely correct, just do a system wipe. In fact, thats even overkill, lol. If you are going to get a knock on the door by the popo with a searh warrant, its going to be at the address that you are registered as living at or they have surveiled you living at (again, unless ur some big time dealer ur not gonna be under surveilance dont start getting paro). Basically, the addresses you live at, and in particular the address you live at which has an internet account i your name, is are where u wana clean up. The cops are never ever going to obtain search warrants for multiple houses on the off chance theres evidence you are a personal drug user.....theyd only do this for drug syndicates running operations out of multiple locations. Again, put things in perspective.
2: With this PC you should do at LEAST a tripple pass encryption/format of all drives used in the system if you want peace of mind, ERASER iwll do this but GOOGLE how to use it properly. Tis would be sufficient for most. I however recently went througha similar period of wanting to wipe the slate clean and start using live boot dvd's only, so PURELY for 10000000000000% Piece of mind, I got rid of all the hard drives used in my system, destroyed the discs in them as stated and disposed of them. This was not because Im a big orderer, vendor or think im being watched. It was purely because after finding that windows had logged some incriminating info somehow off my mounted truecrypt volume, I jsut went balls to the wall so that now I know theres not a snowballs chance in hell of any evidence off my pc in court if that should ever happen. How far you want to go is up to you. Some people sleep easier on things than others.
3: Again, same answer as above, and id assume the laptop is clean if u dispose of the HD. Although Im a PC person, never owned a laptop, no idea of how they operate so I cant give you a 100% answer.
S
-
Well, the beauty of it is none of the IP's are under the name I ship to :D Even until recently I didn't even ship to my own home. I have recently only for small scale things 1/8th's shrooms ect... Since I lost my other shipping address.
As far as #2 I just did a 30x pass with eraser on anything tor or SR related... I only erased the files I didn't format the HDD or encrypt it. I don't do that with eraser do I? I just selected the individual file folders. I know for a fact there was not one thing SR related stored anywhere but my desktop and recycle bin. I plan on trashing the HD when I get a new external.....
Ok so now I am to the point where I have a brand new USB 16gigs. I want to make it EXACTLY like the darknet booters on SR!
-
There isn't much reason to destroy your HDD and dump it at some random location, unless you want absolute peace of mind. If you are okay with 99.999999999% peace of mind, and it is a HDD and not SSD, you can just wipe it with ATA Secure Erase. SSD and USB drives and you may need to trash them though, depending on what has been on them.
-
Who cares if it looks suspicious... you can't go to jail for having an encrypted hard drive
For example in the UK you actually can:
First of all, references – the law is here. You will be sent to jail for refusing to give up encryption keys, regardless of whether you have them or not. Five years of jail if it’s a terrorism investigation (or child porn, apparently), two years otherwise. It’s fascinating – there are four excuses that keep coming back for every single dismantling of democracy. It’s terrorism, child porn, file sharing, and organized crime. You cannot fight these by dismantling civil liberties – they’re just used as convenient excuses.
http://falkvinge.net/2012/07/12/in-the-uk-you-will-go-to-jail-not-just-for-encryption-but-for-astronomical-noise-too/
-
Who cares if it looks suspicious... you can't go to jail for having an encrypted hard drive
For example in the UK you actually can:
First of all, references – the law is here. You will be sent to jail for refusing to give up encryption keys, regardless of whether you have them or not. Five years of jail if it’s a terrorism investigation (or child porn, apparently), two years otherwise. It’s fascinating – there are four excuses that keep coming back for every single dismantling of democracy. It’s terrorism, child porn, file sharing, and organized crime. You cannot fight these by dismantling civil liberties – they’re just used as convenient excuses.
http://falkvinge.net/2012/07/12/in-the-uk-you-will-go-to-jail-not-just-for-encryption-but-for-astronomical-noise-too/
You can't go to jail for having an encrypted drive in the UK, only for not giving up the passwords. Use deniable forms of encryption and make them prove you are not giving up keys.
-
Subbed and bumped.
Great thread 8)