[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: Untitled.png (424 KB, 996x498)
424 KB
424 KB PNG
is it possible to encrypt my data, so the police will never access the files with current known technology?
>>
>>106433989
as long as you're alive, no
that's not meaant to be construed as kys, the fact is authorities will leverage anything they can at you, regardless of how good your encryption is
>>
>>106433989
>is it possible to encrypt my data, so the police will never access the files with current known technology?
yes

>>106434021
>just spewing out random words like he's having a stroke
fuck off, retard.
>>
>>106433989
It is, but assuming you have key disclosure laws and you make a mistake in the process, you might screw yourself over. If you're gonna be the super elite hackerman you should move to a country that doesn't allow you to incriminate yourself/mandatory key disclosure.
>>
File: secret-keeper.jpg (102 KB, 1280x720)
102 KB
102 KB JPG
>>
>>106434304
>just spewing out random words like he's having a stroke
https://en.wikipedia.org/wiki/Coercion
>>
>>106433989
The fact that you're hiding evidence itself constitutes as evidence.
>>
>>106434470
>he really has no idea
this is why giving computers to troglodytes such as yourself was a fucking mistake.
>>
>>106434530
How is he wrong? They don't even need to beat you with a wrench. A judge can order you to give them the key and if you refuse, imprison you indefinitely for Contempt of Court. So far the record for longest time in prison for Contempt is fourteen years. You willing to hold out that long?
>I'll just say I forgot.
That's what the man who ended up in Contempt for fourteen years tried. How well did it work for him? Fourteen years of prison.
>>
>>106434587
In first-world countries you cannot be legally compelled to hand over encryption keys. That only happens in shitholes like the UK and Russia.
>>
>>106434353
>mandatory key disclosure.
What if you render yourself unable to disclose the key?
>key is randomly generated, so you can't memorise it
>ensure you don't permanently store the key anywhere on your computer
>store the key on a server you've set up in another country
>each time you want to access the drive, you connect to your server and retrieve the key
>if the key hasn't been successfully retrieved at least once in the last 24 hours, the server nukes itself, including any information about this key
>>
>>106434625
being physically unable to disclose a key is a valid defense and is usually done through secret-sharing schemes. but crucially, you WANT evidence of such a scheme being in-place or else the courts will just say you aren't telling the truth when refusing a key disclosure request on those grounds
>>
File: 1708350057087732.webm (1.38 MB, 720x720)
1.38 MB
1.38 MB WEBM
>>106434608
This post cannot possibly be serious.
>>
>>106434651
>le shadowy black bag "contempt of court"
If your computer is encrypted in the United States they will certainly try their best to get around your encryption regardless of your assistance, but the fifth amendment grants you the inalienable right to remain silent when asked to produce a key. It isn't contempt of court to not confess to a crime you didn't commit.
>>
File: xkcd-538.png (26 KB, 448x274)
26 KB
26 KB PNG
>>
>>106433989
Yes it's why they want to ban encryption.
In most places it's actually illegal not to disclose your encryption keys for this reason.
>>
>>106434470
YES
A twenty bloat skill. ENCRYPTION glowies they can do. They do.
>>
>>106434662
There have been court cases that have gone in both ways. Do you really want to tempt fate on which way the ideologically minded judge will rule in your case? Remember, when it comes to Contempt, she's judge, jury, and executioner.
>>
>>106434692
Usually it's a case of 'they have good reason to suspect there's something illegal in your encrypted data somewhere'. Or invented one.
>>
>>106433989
Anon, you need Setec Astronomy.
>>
>>106434716
Yes, in one case they actually saw the kiddie porn before the guy could encrypt it but in other cases they've simply told the judge that they're pretty sure it's there because it's a bad guy who does that kind of stuff. It's not like this type of shit is anything new. Long before sophisticated encryption was in the hands of the public, judges would allow all manner of rights violations based on conjecture. Only if you have the resources to fight to high level courts could you prevail.
>>
>>106434692
I mean sure, but miscarriages of justice and violations of the constitution are always a factor in any legal situation and you realistically can't do anything about them. But having good encryption and refusing to give up the keys is much better for you than just letting the police get instant access to it.
>>
>>106434587
Thats the beauty of the 5th amendment, the man that was held for 14 years was ordered to produce 2.5 million in a civil suit and refused to.
Worse case is really ending up in jail (not prison) for several months
>>
>>106433989
yes, its called full disk encryption
>>
>>106434353
>key disclosure laws
Easy, plausible deniability encryption. Nothing to see here judge-kun, just family photos and uninteresting stuff!
>>
>>106433989
Even normal AES can do that.
AES-192 and AES-256 can't even be cracked with quantum computers. (AES-128 probably can't either but it's not a certainty)
>>
my lad. just plant a c4 charge under your disks. if it gets compromised you just blow it up with a remote controller from your phone away in mexico.
>>
>>106435380
You have to be really careful though, it's like walking through a minefield. You have to make sure that you don't use storage devices with wear-leveling like SSDs. You have to make sure that you're not using trim commands. You have to make sure that you don't get btfod by cold boot attacks. You have to deal with a bunch of other things that I don't even know about. Don't store data locally, store data by using blockchains, this is a joke.
>>
>>106433989
They will find other ways to prove you're a pedo if they have to
>>
>>106434587
This. The best way is for them to never get their hands on the disk or know that it exists in the first place. Keeping government secret-tier shit on an easily findable device is retarded, even if it's encrypted. If they know a device exists, they'll get a search warrant for it and then you are screwed one way or the other.

You should be physically hiding the drives somewhere where they are statistically unlikely to ever be found or store the data internationally and keep ZERO connection footprint (easier said than done). What should happen is that they search "all" of your devices and find no incriminating evidence.

But honestly, if it gets so far that the government is searching your devices for evidence against you, you are already fucked. They can just """find""" child porn onto your drives after they get them into their possession and you would have zero defense.
>>
>>106434587
For most people asking about this shit it's probably better for them if they're in jail for 14 years due to "contempt of court" instead of being in jail for terabytes of child porn.
>>
>>106434489
How do you know there's evidence?
>>
someone post the xk...
>>106434664
nice
>>
>>106435726
>you would have zero defense.
what about the dezi chadman gambit?
>>
Weakest point in a secure system is the flesh that operates it. The strongest cutting edge encryption isn't worth shit if OP would drop his trousers and keys for a glowie pretending to be a woman displaying even a shred of interest in him.
>>
>>106435768
What is that?
>>
>>106435801
https://www.bbc.com/news/articles/cr4e9ddwd5ro
>>
>>106434587
No one is obliged to produce evidence against it self. At least on reasonable countries. Simple as.
>>
File: 1725426634516.jpg (46 KB, 860x860)
46 KB
46 KB JPG
>>106433989
Yeah, just place your hard drive in this encryption machine
>>
>>106434641
This kind of thinking renderes all laws usles.
Chorts can claim you know something with weak evidence and keep you in prison forever. Regardles of encryption even being used.
>>
>>106434716
Judges have more power in US than cesar had in rome. Their existence is abomination of justice.
And a great case why we need laws written in code.
>>
>>106435411
Eventually it all gets cracked given exponential computation growth. What do you know? what algos do you use?
>>
>>106435814
Yeah, that would show them.
>>
So basically there's no true PRISM break?
>>
File: 1736107612217295.png (214 KB, 631x513)
214 KB
214 KB PNG
the funny thing is that the more sophisticated the tool you use the more likely law enforcement has a way around it in their toolkit

meanwhile if you just encoded it using pig latin the script kiddies working in law enforcement would never figure it out
>>
>>106435923
why is it so tiny?
>>
>>106435726
>But honestly, if it gets so far that the government is searching your devices for evidence against you, you are already fucked.
Indeed. Your best bet at that point is to really try to not be taken alive.
>>
They'll just turn their cameras off and beat the shit out of you until you give them the password.
>>
>>106433989
Encryption doesn't have backdoors. Even if quantum computers are used, they're not going to use it on the average Joe's laptop.
>>
>>106434587
its called a duress password. if they force you to give them the password, give them the duress password instead. it will erase all media on the device. grapheneOS has this
>>
>>106439007
unless some new interdimensional computing is discovered and it shits on any current and quantum encryption.
>>
>>106434489
thats retarded as fuck
>>
>>106434587
that's weird...why would you go to jail if you forgot your password? wouldn't they need to prove you didn't actually forget it?
>>
>>106433989
most police technicians stop looking after like 3 to 5 directories as long as they have inconspicuous names like files/data/images/cache/misc
>>
>>106439019
destruction of evidence is a crime. also think for a moment before you give a knee jerk response to this post
>>
>>106439036
In the US at least, they like to use "reasonableness" tests. It's reasonable to expect that someone knows the password to a device that they use regularly, because everyone using a device regularly knows their password (or else they wouldn't be able to use it regularly). And the odds that you would legitimately forget your password the instant you get arrested is astronomically low. Basically, they use probability against you in a roundabout and informal way.
>>
File: Standard_Crowbar_Black.jpg (468 KB, 607x2558)
468 KB
468 KB JPG
>>106433989
>never access the files with current known technology
They just beat you up instead
>>
>>106439156
but I happened to change passwords after a long while and immediately proceed to forget it in two days after not using it. that's a real phenomenon. it's like you aren't allowed to, which is weird.
also what if you provide whatever you remember as maybe using for new password, but doesn't work? you are providing what you think might be, as long as you provide it..I see no issue. seems like abuse to me, or sort of mask off it's all theater and they'll just fuck you up laws or no laws
>>
>>106439183
>and immediately proceed to forget it in two days after not using it
as in it didn't get transferred from short term to long term memory storage, in my brain. when changing password after a long time you have to keep using it or you forget it. scary to think that can bite you in the ass to that degree
>>
>>106439183
>eems like abuse to me, or sort of mask off it's all theater and they'll just fuck you up laws or no laws
and thus, anon gained enlightenment
>>
There's nothing in my computer I'd be willing to risk going to jail just for protecting, but I hate the idea of these demonic entities having no respect for my privacy, so if I ever find myself in such a position, I'd do whatever it takes to waste their time and only cave in at the very last when it's a 100% certain I'd be going to prison.

Use classic ciphers with maxxed out settings and avoid pozzified EC bs.
>>
There's one and only one known way of achieving perfect secrecy
https://en.wikipedia.org/wiki/One-time_pad
>>
>>106439183
That's just
>I forgot it
But with extra steps. Just straight up forgetting it is also something that legitimately happens, yet it's no defense. Basically, they call bullshit because there is a 99.999% chance that you DO know the password and are just bullshitting.

And the standard of proof needed to convict you of something isn't 100% irrefutable evidence. They just have to prove *beyond a reasonable doubt* that you did it. Only a retard would legitimately believe that you forgot your password (especially if you have no evidence that you actually changed your password 2 days before getting arrested).
>>
>>106439019
The glowies will make a backup of your data before entering a password.
>>
>>106439314
>(especially if you have no evidence that you actually changed your password 2 days before getting arrested).
oh fuck off what if some hacker got into your shit, planted some shit, tipped off the cops, you noticed something weird you get paranoid and change your password? and then forget it? fuck outta here with your bullshit.
also wtf evidence can you provide that you changed some local password are you insane? you have to record yourself changing passwords so you can prove you changed your password in case you forget it and laws needs you to prove you changed your password? this is nonsense, like everything is fake and gay and they're not even hiding it anymore
>>
>>106434718
you wont know who to trust
>>
>>106439340
Dude, I'm just telling you what will happen and why
>"My dog ate my password!"
type shit won't work (or whatever contrivance you come up with). Don't get mad at me lol. But you are welcome to try I guess. I'll put some money on your books bro.

The courts use probability under the hood to combat bullshit excuses exactly like what you are trying to come up with.
>"A solar ray flipped a bit in my system, changing my password!"
>"I was...uh... hacked! And had to change my physical device password for some reason."
>"I just changed the password on the machine I have been using for the last 5 years and instantly forgot what I changed it to! Whoops!"
Are all technically possible, but highly improbable and thus shitty defenses.
>>
>>106434625
>What if you render yourself unable to disclose the key?
Then you also render yourself unable to avoid going to jail
>>
>>106434489
An evidence of what?
Guilty of what?
You can't blame someone about something you don't know because you couldn't read it

You're the tardest of g today, which is pretty impressive
>>
>>106433989
i wish we could start up a pc like that, with a key and ignition
>>
>>106439327
>FBI is going to pull data directly off the flash chips
That's impossible, Apple said that operating at the component level is impossible due to the size of the chips.
>>
>>106434489
They have to be able to prove that, though.
>>
>>106433989
>>106434304
You would have to do a couple different things.

Make a program that has a multi step encryption AND make it change the encryption automatically every HOUR (or every 10 minutes if you want to go crazy)
And, the encryption would need some scanner detector for people who are not you.
And set it so 2 wrong guesses (or more then 1)
AUTOMATICALLY deletes entire machine (or sets a fuse to light stuff on fire)

The amount of different stuff you would need to have active at all times would be insane.

Might as well hook pc up to some sort of dna testing machine/urine tester, and make your self bleed/pee every time you want to decrypt.
>>106434381
Good answer. Need to make sure the emp device actually wipes/frys the electronics enough. I'm not sure if a lot of them do.
>>106439019
>password to delete data
I knew about this, but not sure I knew the specifics. Thanks.
>>
Unless it's your shitcoin wallet it would be easier to just destroy everything.
>>
>>106438256
>why is it so tiny?
It's designed for inserting your MicroBenis into it.
>>
Yeah man, just give it to us and we'll encrypt the shit out of it
>>
>>106433989
They don't need to crack your encryption key when they could just crack your kneecaps with a wrench.
>>
>>106442440
>I'm not sure if a lot of them do.
All 3000-series EMPs do that at least.
>>
>>106434489
>has never heard of plausible deniability
>>
>>106438200
true
i hear some people store their crypto keys in minecraft worlds lol
>>
>>106434587
Fifth amendment. I think you can be court-ordered to decrypt and provide specific data relevant to the case in certain types of legal procedures though. That's well into the domain of lawyers though, I only have a couple google searches behind me.
>>106433989
Encryption itself has provable strength, and so long as you use modern algos and a good key it will take so long to brute-force the encrypted data that its not feasible to even try. That said, systems are only as strong as their weakest link, and so it's gonna be the stuff around the encryption that's vulnerable to attack. e.g. if someone gets a keylogger on your machine through a vulnerability in some unpatched unrelated software, then they can get your decryption keys if you type them. Stuff like this.
Generally speaking if you have enough money you can break into encrypted data through some means, but you have to be valuable enough of a target to warrant such procedures.
>>
>>106444247
That's why I embedded my password onto a micro SD card located in my knee. Then the police will be arrested for destruction of evidence when they break my kneecaps!
>>
>>106439532
This is why the only reasonable defense against key disclosure laws is having documented evidence of a secret-sharing scheme between other parties, or a non-present hardware key involved, to show you physically cannot provide the authorities with what they want. Of course, that then makes it inconvenient as fuck for you but maybe it's worth it for your use-case.
>>
>>106433989
No.

Your only option is to never connect the device to the internet and isolate it's power supply. Yes, they can get in through the power grid.
>>
>>106433989
>never
no
>>
>>106439127
Couldn't you just have the duress password just delete certain specific directories and files?
Then probably the config file pointing to those directories just to be safe.
>>
>>106438200
Most of what the cops are doing is a fancy ctrl+f.
Hide something a little in something that can be read only with an eyeball and you are safe.
>>
>>106433989
It depends how important your data is.
If you're going to GITMO or similar, then nothing will save you.
If you're an average nobody then two layers of encryption combined with strong passwords and a reasonable strategy of plausible deniability is probably all you'll need for this lifetime. A very easy option for example is to have a triple-encrypted veracrypt container stored on an SSD that's also fully encrypted. I have seen lots of cases in Canada that the police can't proceed on simply because they can't get through pretty basic security.
>>
>>106433989
Stop looking at CP.
>>
>>106446908
Pretty smart. Throw in a way to purge the data at the disk level instead of just the file allocation level and it would be impossible to recover along with being difficult to detect.

You would need disk-level encryption so that they can't bypass the OS though. A forensic investigator might expect something like this and side boot their own OS to access the file system. I'm also not sure if there's a way to "safe boot" into some OSs and stop programs from running.
>>
no
>>
What if the data isn't encrypted, but random bytes? Like thousands of files of random bytes?
>>
>>106433989
Yes but the real problem is the windows xp laptop with 500 gigs of pizza the feds will plant on you.
>>
>>106442440
None of what you said makes sense.
>multi step encryption
How does that help? A strong encrypt is as good as two encrypt that are half as strong. Just make one encryption you use stronger.
>change the encryption every HOUR
And how are you supposed to know the decryption key? You'll have to be there with the key to decrypt before you can reencrypt too.
>scanner detector for people who are not you
How do you see that working? If it's outside the encryption you can just bypass that and give a "it's me" signal using other hardware.
>2 wrong guesses AUTOMATICALLY deletes entire machine
The very first thing they'll do is make a perfect bit by bit copy of your data.
>dna testing machine/urine tester
Interesting movie concept, but it's just a keyfile with expensive hardware, and accepting a keyfile an authority can always extract from you.

Use strong encryption and a keyfile on a device you always have access too and can wipe quickly (preferably by pushing a button on the device.)
It's still not really enough to protect from every attack, but I think it would protect you for most cases.
Be aware though, some countries have laws that require you to be able to decrypt a device for the authorities, and it is a crime to not be able to do that, and they'll charge you based on whatever the maximally bad thing you could have on the device is. Not sure how that interacts with plausible deniability (i.e. a raw dm-crypt device) but something to consider.
>>
>>106444716
genius
>>
>>106446908
GRAPHENE DEVS DO THIS NOWWW
>>
In pretty much every pedo catcher video I've seen, the guy always gives the police his phone's passcode without any hesitation when they ask for it. Are people really that retarded?
>>
>>106448219
Oops it has your fingerprints now
>>
>>106448374
i mean if you don't comply they kill you
>>
>>106448374
Outsmarted by tv crew don't expect much.
>>
>>106448397
These retards wouldn’t even get arrested if they just kept their mouth shut. The kind of evidence vigilante pedo catchers have isn’t good enough to charge anyone with a crime. The only reason they go to jail is because they outright confess to it the moment the police show up and incriminate themselves.
>>
>>106448434
This even happened on To Catch a Predator. The only ones who got away with it just shut up and got a lawyer. Everyone else confessed and got convicted.
Don't talk to police. If you've become a matter of national security, you're getting waterboarded either way.
>>
>>106448374
>they'll never find my child porn, I put it into the gallery named "don't click"
>>
>custom firmware in HDD
>solder on GPS chip
>when it receives power and it's not at home, immediately writes noise
>>
>>106450258
*immediately produces nerve gas
>>
>>106448293
All it would really take is for it to give you the choice to execute a shell command unique to each password.
It doesn't even have to be a duress password per se. It could just be multiple passwords for the same user. One of them could delete the illegal directories, one could do nothing, and another could open a terminal to execute fortune piped into cowsay.
Really, it could just be a slightly more convenient way to have different users with different start files.

Alternatively, you could just tell the cops "I forgot the password to my personal login, so I've been just using my admin PC user for years"
so they try to start in Admin with the password you give them, but you quietly slipped the "flush evidence" command in your .xinitrc, where the last line is to mv an un-incriminating xinitrc into it's place.
>>
>>106433989
Russian post.
>>
File: 1748868647756.png (365 KB, 750x500)
365 KB
365 KB PNG
>>106435754
>>106439034
>>106439554
>>106442227
>>106444543
Pedophiles panicking at the mention of rule of law.
>>
>>106433989
Yes. You need to study mathematics and cryptology. You need to access open-sourced cryptgraphic libraries and study their form and implementation in basic and standard (contemporary) milieus.

Some basic math: Advanced Algebra, Trigonometry, Calculus, Probabilities and Statistics, Differential Equations, and Algebraic Geometry (for working with 4-space and 5-space models and manifolds, multidimensional arrays).

For basic Computing, you need to understand and have a little practice with writing your own basic program that accepts a password and reveals an answer, then how to hash that password, the ln how to split the hash, then how to create a public-private key pair, then salts and initialization vectors.

For mathematics related to the basics of cryptography, you need to understand a variety of algebra, geometry, and probabilities which apply to randomization along a variable curve (the input) and transformation along a discrete boundary (the output). Skewing, mapping, and homomophisms and heteromorphisms are all important.

Play with brute-force checking your own small password program, then play with heuristics (old term for self-refining algorithm) applied to that program for "fingerprinting" and modeling that program. Reverse-engineering binaries through static and dynamic analysis (static: open the binary up in a debugger and IOP walker, dynamic: actually run it in a sandbox and watch the system calls and the memory operations), network forensics using wire-level protocol analysis tools, and system and just forensics using application analyzers for full software-ecosystem and -library intentions interactions.

These are the basics.

Once you have a feel for these, select a small set of popular ciphersuites (Blowfish, 3DES, AES, Twofish) and read their whitepapers.

Try to implement them in your own code.
Then try to write code that does things JUUUST a little bit different .

NOT easy. BUT IT IS possible.
>>
>>106450733
Also look at basic compression algorithms, they inform the output space (expanded content) and computational load (how long it takes to decipher with a key).

LZMA, Gzip, deflate, these are good to start with just to get a feel for how we write a cipher around a compression artifact or how we compress and decompress secure content with some cipher.
>>
>>106433989
Most police officers are clueless retards that don't know how to use cell phone. And if it will be warranted to involve units that know how to do shit then what are you doing there and why are you so retarded to bring police's attention to you?

My advice - avoid meme biometric locks, a password stored only in your head is the safest option It's easier for Police to take photo of your face or ask you to put hand on fingertip reader than force you to speak.
>>
ITT: Idiots learn that there are laws against hiding and destroying evidence
>>
>>106450733
>>106450759
lmao
dumb retard
>>
>>106450783
>ask you to put hand on fingertip reader
they can just cut your finger off if you refuse
>>
>>106450793
ITT: other idiots learn about how the goal is not getting caught.

Destroying evidence is only a crime if it's provable that you intentionally destroyed some evidence.
Once it's gone, there's no way to know how incriminating it actually is. Thus, there's no evidence of any wrongdoing, and no crime in destroying it.

Even then, destroying evidence goes for a far lesser sentence than whatever illegal material was destroyed in the process.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.