[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
So /g/ Suppose the police want to see what's on your phone,
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 32
Thread images: 3
File: encryption[1].jpg (256 KB, 1920x1080) Image search: [Google]
encryption[1].jpg
256 KB, 1920x1080
So /g/
Suppose the police want to see what's on your phone, and you're forced to comply by court order or something.

Is it possible to have multiple partitions etc such that upon viewing the lock screen, you can enter one of two codes, which each code unlocking a different partition?

In which case you can still comply with the court order/whatever, but simultaneously keep whatever you'd like hidden?
>>
depends on exactly what the court order says
but in theory, this is possible, of course. why would it not be?
>>
>>54760245
if you've got nothing to hide you've got nothing to fear
>>
File: nice.jpg (43 KB, 500x495) Image search: [Google]
nice.jpg
43 KB, 500x495
>>54760316
well memed, my friend!
>>
>>54760275
I've just never heard of such a thing, I suppose.

Do you have any idea where I could find info on how to set this up?

I don't have any court orders against me, that was just a hypothetical; in practice though, this would be good for a number of situations both legal and otherwise.

>>54760316
Nice try, NSA.
>>
>>54760245

Sure, get an android, make multiple partitions, encrypt them with SHA-256 and look suspicious as fuck in front of a grand jury. Genius.

It's called an SD card jackass.
>>
>>54760344
oh, I never said it was currently possible to set up (although it might be). I'm just saying in theory, such a configuration is possible.
>>
File: spin_prod_865983512.jpg (56 KB, 1000x1000) Image search: [Google]
spin_prod_865983512.jpg
56 KB, 1000x1000
just installed gentoo on it. nsa is mad
>>
>>54760245
If you mean 'is it technically possible' yes.

If you mean, 'will I get in trouble if the court finds out' also yes.
>>
>>54760346
I suppose. Aren't iPhones already encrypted, without anyone giving them a second look?

Either way, encrypted SD would also work. I'm just trying to think of something less traditional.

>>54760358
Gotcha.

>>54760383
I mean, that's true of any illegal activity being found out, which is what the court hypothetical is of course trying to avoid.
So sure, if it was compromised I realize the court would fuck me over every which way.

Still, good to know it's at least technically possible.
>>
>>54760410
OP, my LG g2 has a guest mode where everything is basically wiped, so I would say it's definitely possible.
>>
>>54760245
>Suppose the police want to see what's on your phone, and you're forced to comply by court order or something.
>implying civilized, non-American countries have this
>>
>>54760245
If the police is after you directly, then you're screwed anyway. Trying to be a smartass and making your data harder to access will only make it worse.
>>
>>54760245
TrueCrypt had a feature that is pretty much identical to what you're asking for. It would allow you to have a decoy partition that you can unlock with a fake password if you're being coerced into decrypting your files.
>>
>>54761532
can you reccomend crypt program that let me make folder and everything put in gets encrypted?
something really simple,i want it for my tit shots
>>
>>54760316
Pedophiles BTFO.
>>
>>54760344
>Do you have any idea where I could find info on how to set this up?
I GUESS you can do it from the grub shell. Like, your ubuntu something shows up as you only os in the grub screen but there's also the option to go to a grub shell, you go there and you then know how to get into your uber 1447 kali thing where you keep all your sekrit h4x data.
I was going to add something else but I forget
>>
>>54762139
ah yes! you might do this but they can still find out if they're keen enough.
Just by looking into the partition table of your disk and the fstab in your system, they'll see something is off, mount the extra partition, see that it's encrypted, and ask you to decrypt it
>>
>>54761398
The UK has forced key disclosure, so they're uncivilized. In the US, the fifth amendment would protect you from this, so the court can't actually order you to disclose your encryption key, thus making Americans civilized.
>>
>>54760245
You can't be court ordered to incriminate yourself, can you?
>>
>>54765686
Not in the US, the fifth amendment protects you.
>>
>>54761605
>i want it for my tit shots
Post'em here and I'll encrypt them for you :^)
>>
>trying to be secretive
>with a cellphone
>costanzaface.png
>>
>>54761605
Luks containers, 7z, maybe veracrypt.
>>
>>54765743
There's a man that's been in jail for 7 months for refusing to give his encryption password to his PC's drive after his sister / someone close to him told the police he has pedophilic pornography there, and they're just holding him indefinitely until he gives it up, since there's already sufficient reason to believe he's hiding illegal material.

> source: some recent Ars-Technica article which for the life of me I can't track down right now.
>>
>>54760245
what about just unlocking your phone for them because your "important documents" are in an encrypted volume you have to manually mount after logging in
you know, truecrypt
>>
>setup Linux Deploy
>Install truecrypt
>???
>Profit
>>
>>54765875
>truecrypt
>not dm-crypt+LUKS
>>
>>54765848
That case is such bullshit. The only evidence they really have is some forensic examiner testifying that it was his “best guess” child pornography would be found on the hard drives and the word of his sister. This is something that wouldn't hold if the guy actually got to appeal it, the only way for them to find him guilty is if he complies and incriminates himself. The fifth amendment gives him the right not to do that.

The problem is that the case isn't actually against the man, it is against his MacBook, and he's held as evidence or some shit.

Source: https://www.techdirt.com/articles/20160428/07395434297/so-much-fifth-amendment-man-jailed-seven-months-not-turning-over-password.shtml

Here's the Ars Technica article you're thinking of, probably: http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/
>>
>>54765979
Thanks, that's exactly the article I was searching for. Whether he's guilty or not this case is indeed bullshit.
>>
>>54765997
He might be guilty, but it has to be proven beyond a reasonable doubt. Since they don't have any evidence, besides people saying shit, he should be let go.
>>
>>54765848
That is a fake story anon, notice how they won't say the name of the person in any article, it's just scaremonger tactics so people fear encryption
Thread replies: 32
Thread images: 3

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.