[Nottingham] gpgpwd - keeping a commandline passwords list

Jason Irwin jasonirwin73 at gmail.com
Tue Jun 19 09:45:07 UTC 2012


On 19/06/12 09:57, Mike Cardwell wrote:
> https://en.wikipedia.org/wiki/Deniable_encryption
> They can't compel you to decrypt something that they can't prove exists.
So long as:
1) you have no logs or other evidence on your system pointing to its
existence;
2) the existence cannot be inferred from the total size of the file and
the size actually decrypted;
3) the deniablity itself is secure
https://en.wikipedia.org/wiki/Deniable_encryption#Detection;
4) your passphrase is strong enough to make a brute-force impractical;
5) they don't catch you with the hidden volume mounted.

Various rumours/news reports crop up from time-to-time about crypto
being cracked.  There's always caveats around how it was done, for example:
http://www.theregister.co.uk/2012/02/03/apple_disc_crypto_broken/

Did you miss Paul's talk on crypto?  It was
enlightening/interesting/terrifying/educational.

J.



More information about the Nottingham mailing list