IMO, deniable something is just not practical in real life. Authorites can make you life real hard, or just throw you straight into jail, just by suspecting you have encrypted materials.
You don’t so it to protect you. You do it to protect others. Your encrypted content could be a list of sources for a journalist. Or email correspondents.
The point is they don’t have to proof if a piece of random data is indeed an encrypted blob.
Imagine you passing border security and got selected for search. They found a piece of data on your device with high entropy without known headers in the wrong place. You can claim you know nothing about it, yet they can speculate the heck out of you. In more civil nations, you might got on to a watch list. In a more authoritive nations, they can just detain you.
They don’t have to prove you hiding something. The mere fact of you have that piece of high entroy data is a clue to them, and they have the power to make your life hard. Oh you said you deny them for a search? First congrats you still have a choice, and secondly that’s also a clue to them.
For more info, read cryptsetup FAQ section 5.2 paragraph 3, 5.18, and 5.21. It is written by Milan Brož who way more experienced than me on this matter.
You cannot differentiate between random data or encrypted data, when it is done right. That is one of the reasons why you should initialize an encrypted drive with random data beforehand
That scanner is simply looking for high entropy data, and then report to its operator. It wouldn’t care if it is a drive or a volume or a file. If the entropy is high, flag it.
All random data have high entropy, same for encrypted data. The officer can see you have high entropy data then start throwing questions at you.
This community need some understanting cryptography and its prctical use. Deniable encryption exists and does work on paper, but only on paper.
Sure but knowing nothing much of encryption. If they put you away for non-compliance and suspicion its probably less than what they could put you away for if they actually found the <whatever it is> file.
Like. I can cut the bags of coke and empty it into the ocean. They probably knew I had it, but not how much.
The point is they don’t have to proof if a piece of random data is indeed an encrypted blob.
But they do need to suspect it.
If they find an encrypted blob, ask for the decryption key, they decrypt the data and analyse the decrypted data, then they may not suspect that a different decryption key will reveal a different set of data.
I think you overvalue the skillset of border security. This may seem trivial to you but it’s uncommon to hire people trained to this level of competence and put them at every point of entry. A decent cybersecurity investigator needs a big salary.
That would probably happen if you were already a suspect of something or a high profile person and they moved in resources for you. No way border security is randomly sweeping for headers and entropy, they basically just look at it with the explorer and clone it, possibly using some software to scan for known security vulnerabilities to access encrypted parts. That would be a court ordered search or a high profile crime investigation, or maybe a really really unlucky day where the expert was already there for another reason, but the rest i agree.
Is it really though? I would assume there would be automated systems that can do 80% of the job. It can be as simple as a USB key holding a portable executable that can run and connect to a remote system and report back the findings which the officer can just read the report in plain English. Training, of course, is expensive and rarely do so, but automation can get somewhere close relatively inexpensive.
I get what you mean, I think in a realistic scenario this only work to circumvent some laws. if you are tortured by someone who know about this and don’t care about your life, then it’s meaningless.
Beat what out of you? You already gave them a password that decrypts a specific file/volume/etc. If they want to beat you, they will beat you regardless of your possession of any encrypted materials.
I guess having a thick provisioned VM image on your laptop means that you are hiding something. Again if the evil government you are trying to hide something from doesn’t need reasonableness as a reason to detain you, then who cares? No matter what you do you are rolling the dice every time you interact with them.
Which is of course similar to the US today, so if I needed to hide something from them I’d make sure that once i’m legally compelled to give my password they at the very least wouldn’t have what they are looking for, since there is no way I could prove I didn’t have it anyway.
That’s why the second partition ( I’m case when you have 2 truly hidden and for the plausibility denial one ) should have some incriminating data as well like porn with lesser fines. It shouldn’t be blank slate windows. I mean it should be believable to be “hidden” partition
IMO, deniable something is just not practical in real life. Authorites can make you life real hard, or just throw you straight into jail, just by suspecting you have encrypted materials.
You don’t so it to protect you. You do it to protect others. Your encrypted content could be a list of sources for a journalist. Or email correspondents.
https://xkcd.com/538/
That is the point. They cannot find it. Yes they can try to force it out of you but then they would need to know it is there.
When you get searched for drugs and they do not find any, what does lea do?
The point is they don’t have to proof if a piece of random data is indeed an encrypted blob.
Imagine you passing border security and got selected for search. They found a piece of data on your device with high entropy without known headers in the wrong place. You can claim you know nothing about it, yet they can speculate the heck out of you. In more civil nations, you might got on to a watch list. In a more authoritive nations, they can just detain you.
They don’t have to prove you hiding something. The mere fact of you have that piece of high entroy data is a clue to them, and they have the power to make your life hard. Oh you said you deny them for a search? First congrats you still have a choice, and secondly that’s also a clue to them.
For more info, read cryptsetup FAQ section 5.2 paragraph 3, 5.18, and 5.21. It is written by Milan Brož who way more experienced than me on this matter.
The most relevant part is 5.18 and it only talks about partitions not files. A file can be way more easily hidden in a partition then a partition.
It is simply no hope aginst an automated scanner. No one search for files manually today.
You cannot differentiate between random data or encrypted data, when it is done right. That is one of the reasons why you should initialize an encrypted drive with random data beforehand
That scanner is simply looking for high entropy data, and then report to its operator. It wouldn’t care if it is a drive or a volume or a file. If the entropy is high, flag it.
All random data have high entropy, same for encrypted data. The officer can see you have high entropy data then start throwing questions at you.
This community need some understanting cryptography and its prctical use. Deniable encryption exists and does work on paper, but only on paper.
That is exactly what i said.
If random or deleted or fragmented or corrupted files will lead to me being questioned, then every data carrier will lead to a lotof questions.
Sorry. Data structures exists and uniformly random data is rare. Patterns still exists.
And deleted is a bad counter as deleted files won’t have a record in the file system.
Sure but knowing nothing much of encryption. If they put you away for non-compliance and suspicion its probably less than what they could put you away for if they actually found the <whatever it is> file.
Like. I can cut the bags of coke and empty it into the ocean. They probably knew I had it, but not how much.
But they do need to suspect it.
If they find an encrypted blob, ask for the decryption key, they decrypt the data and analyse the decrypted data, then they may not suspect that a different decryption key will reveal a different set of data.
I think you overvalue the skillset of border security. This may seem trivial to you but it’s uncommon to hire people trained to this level of competence and put them at every point of entry. A decent cybersecurity investigator needs a big salary.
That would probably happen if you were already a suspect of something or a high profile person and they moved in resources for you. No way border security is randomly sweeping for headers and entropy, they basically just look at it with the explorer and clone it, possibly using some software to scan for known security vulnerabilities to access encrypted parts. That would be a court ordered search or a high profile crime investigation, or maybe a really really unlucky day where the expert was already there for another reason, but the rest i agree.
Is it really though? I would assume there would be automated systems that can do 80% of the job. It can be as simple as a USB key holding a portable executable that can run and connect to a remote system and report back the findings which the officer can just read the report in plain English. Training, of course, is expensive and rarely do so, but automation can get somewhere close relatively inexpensive.
Except they know about deniability
They know it exist as a concept. They can’t prove that the specific decrypted message contains a super-secret encrypted message as well.
The don’t need to. They can just beat it out of you. In the kind of places where they can force you to hand over passwords it doesn’t matter.
I get what you mean, I think in a realistic scenario this only work to circumvent some laws. if you are tortured by someone who know about this and don’t care about your life, then it’s meaningless.
Beat what out of you? You already gave them a password that decrypts a specific file/volume/etc. If they want to beat you, they will beat you regardless of your possession of any encrypted materials.
they will know you have such program on your computer
it is capable of deniable encryption
most people use it for this exact reason
the file size of the container will not match the size of the contents of your ‘safe’ volume
I think a reasonable person/court/judge/police/etc. would conclude that you are most likely still hiding something given all that.
I guess having a thick provisioned VM image on your laptop means that you are hiding something. Again if the evil government you are trying to hide something from doesn’t need reasonableness as a reason to detain you, then who cares? No matter what you do you are rolling the dice every time you interact with them.
Which is of course similar to the US today, so if I needed to hide something from them I’d make sure that once i’m legally compelled to give my password they at the very least wouldn’t have what they are looking for, since there is no way I could prove I didn’t have it anyway.
That’s why the second partition ( I’m case when you have 2 truly hidden and for the plausibility denial one ) should have some incriminating data as well like porn with lesser fines. It shouldn’t be blank slate windows. I mean it should be believable to be “hidden” partition