Can the police force you to decrypt your hard drives?

Can the police force you to decrypt your hard drives?

Other urls found in this thread:

bestvpn.com/veracrypt-hidden-volumes/
theguardian.com/technology/2017/mar/23/francis-rawls-philadelphia-police-child-abuse-encryption
en.wikipedia.org/wiki/Key_disclosure_law
quora.com/How-fast-could-the-worlds-fastest-supercomputer-brute-force-crack-a-password-Could-anyone-provide-a-spreadsheet-with-how-fast-the-worlds-fastest-supercomputer-could-break-a-password-that-is-1-2-3…100 -characters-long
kali.org/tutorials/emergency-self-destruction-luks-kali/
gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions#5-security-aspects
github.com/hephaest0s/usbkill
twitter.com/AnonBabble

ye

Yes... Unless you have a hidden volume ( bestvpn.com/veracrypt-hidden-volumes/ ) because it's mathematically impossible to know if it exists unless you tell them.

You could keep all your crazy shit in the hidden volume and just keep a clean encrypted partition that you hide the volume in. Give them the password to your encrypted volume and let them have a look around, keep a few memes there and that's it.

>Can the police force you to decrypt your hard drives?

>A former Philadelphia police officer who has spent 17 months in jail will remain there indefinitely unless he agrees to unlock two encrypted hard drives. The suspect, Francis Rawls, has so far refused to comply with the court order, citing the fifth amendment, which protects him from self-incrimination.

>The case has become a battleground for civil liberties campaigners, who believe that citizens should have the right to protect their critical information and to be protected from self-incrimination. However, the suspected nature of the encrypted content makes for a challenging ethical quandary: those hard drives are believed to contain images depicting child sexual abuse. In order to stand up for the rights of citizens across the US, organizations such as the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union (ACLU) must defend a suspected pedophile.

theguardian.com/technology/2017/mar/23/francis-rawls-philadelphia-police-child-abuse-encryption

But you need to make the fake partition believable, so fill it with hardcore gay fetish porn instead

i hope you rot in jail

Ye, a night with Turbo Tyrone will have you screaming the decryption codes

>A former Philadelphia police officer who has spent 17 months in jail will remain there indefinitely unless he agrees to unlock two encrypted hard drives.

Indefinite prison sentences explicitly breaks the torture clause of the declaration of human rights. The article on torture explicitly mentions that jail sentences without a set timeframe is torture AND is a human rights violations.

Governments CAN break human rights of course and America usually don't care about human rights unless it is in regards to what somebody else is doing.

>But you need to make the fake partition believable
Not really... "I don't use the volume much... just testing it out" He could just keep a folder with several copies of some picture of Gary Busey or some other random shit. They would go "Why do you have 4000 copies of the same picture of gary busey in this encrypted folder", "because it's embarrassing"/"I was testing it out"/"I dunno" are all good answers.

en.wikipedia.org/wiki/Key_disclosure_law

Some more international information.

>Governments CAN break human rights

No shit. UN declaration of human rights is only significant in the minds of ignorant women.

And when talking about muslim countries. But it does not matter when it comes to ourselves.

>tfw I use windows 10 without bitlocker
>tfw I have nothing to hide

They can when it's seen as a foregone conclusion. Say that someone reports that you have CP on your computer, and are willing to take an affidavit, describing exactly what they saw ("a young, brunette girl that appears to be under 10 years old, having sex with an older man" for example). Then, the judge will order the decryption, and hold you in contempt if you don't. However, if the file doesn't exist, then the person making the affidavit suffers legal repercussions themselves.

This is regarding the law in the US. It varies elsewhere.

No, but you can not force them to release you when you do not cooperate.

What if you don't remember the password?

Actually, without enough evidence, they aren't allowed to keep your in custody for too long. They need to prove you are guilty. Not you have to prove that you're innocent.

That's interesting.

Of course they'll say you're lying because most people are but what if you honestly did forget?

It's possible. You're not going to keep the password in a text file or even written down anywhere if you're serious about it. You'll also use a unique one. I could see it happening where you'd forget.

That would suck to get in trouble for something you honestly can't remember. Would be even more ironic if there's nothing there except for a bunch of dank memes that you put there to test it out... Talk about a nightmare.

Then again if it got to that point then you've already fucked up bad enough either way.

you can claim you forgot the password. That cop that's in jail said he refuses to disclose it which fucked his case

Can't they just bruteforce it?
Since it's a government they surely have the computing power to do so

Can't he argue that he wants to disclose it now but doesn't remember the password?

don't really know. I think everyone is waiting for his case to go to SCOTUS because this is big constitutional shit that can't really be addressed by some 18th century law about unlocking your safe

Using Windows 10 without bitlocker is like doing something in the police station without a mask they give you. It's pretty much the same as if you used it.

Why would they use billion dollar super computers for tens of thousands of years to bruteforce your illegal Chinese cartoon collection?

Totally depends on your jurisdiction.

>America
>2018
My country does not have this problem

>without enough evidence, they aren't allowed to keep your in custody for too long
They can keep you however long they fucking like.

There's an active case right now of a man who's been imprisoned for about 2 years for refusing to decrypt his HDD.

He's not getting out.

But it is internationally recognised as torture even by the US government

You're in a rude awakening if you think the government plays by the rules.

Man... At least North Korea and Syria are expected to follow the declaration of human rights and get in trouble when they don't. If only they cared that people expect them to have a higher moral standing than everyone else.

Literally this
Unless you are a terrorist or a pedo no one gives a fuck about your shitty computer

t. cia nigger

Depends on how badly they want to know what you've encrypted, who is asking the questions and your tolerance for pain.

The answer is generally yes.

>2017
>Posting on 4chins without being a terrorist or a pedo
Go back to plebbit

There is a very massive swath of Middle ground here, where people are neither doing anything wrong, nor okay with being wronged themselves. Invasion of privacy is disrespectful, and any person with any amount of self respect who understands the situation will be opposed to it.

It's like calling a teenage girl a terrorist/pedo for not wanting her parents to read her diary.

>invasion of privacy is disrespectful
Sharia bans invading privacy, except against millitary targets in war. You are propagating sharia so no wonder you want to be able to have privacy, Jihad John

Is there any form of decryption which does destroy the content when you enter in a specific password?
Seems to me the best solution for that case.
They force you to open it and you destroy it.
You still could get in trouble for destroying "evidence", but since they don't know what it is it can hardly be called evidence.
Since the information is lost then, there is no further reason to keep you in prison except for obstruction of law or something like that.

Just use a hidden partition and give them that password. They would need to prove there was a hidden partition.

Sorry I meant give them the password for the non-hidden partition (brain fart).

That is unfair... They can't prove that there is a hidden partition. Try again, next time don't waste my tax dollars sending hard working police on wild goose chases. How can they even guess a hidden partition (or two) exist? This is why math should be illegal, you just use it for nefarious purposes

Maybe not

You need to make it convincing though. Have some shitty gay porn on the bogus partition and bitch and moan about giving them the password saying it violates your privacy rights. Then begrudgingly give it to them.

I think I've read somewhere that the fifth amendment only applies if the cops are 100% sure that you are hiding something. Otherwise, they're not allowed to force you to hand over your encryption keys based on a hunch.

Alphabet agency are data junkies. They can't function properly unless they know everything about everyone, even if they are good goys.

Why make it convincing? Just say that there is no hidden partition. Just in the same way that you can say that you don't own a invisible mobile phone currently in China. You COULD own a mobile phone that currently is in China, but unless there is evidence they cannot book you for it. Because then they would just say "now give us the password for the hidden partition inside the hidden partition and the password for the hidden partition inside that" and so on forever

You encrypt to protect yourself from other people not from governments.
it's totally retarded to think you have the slightest chance to get away with it.
imagine the following scenario
>fbi raid your house
>get hands on encrypted hard drives
>you refuse to tell them your passphrase
>fbi release you because there is nothing they can do
This just can't happen and if you think otherwise you're seriously retarded, don't be a baddy if you can't even understand something this simple.
It's exactly like when retards keep blabbering shit like "I have rights" or "you can't arrest me" just shut your mouth and do what they want you to do, you will be out in less than 12h in most cases anyway.

You say that as if the cops didn't immediately image your hard drive during your capture.

FBI only prosecute when they have overwhelming evidence. If they're telling you to decrypt, you're already boned.
No one can legally ask you to decrypt unless they already know what the volume contains. It's the same principle as showing leniency to murders who reveal the locations of the victims bodies.

if some fucker breaks into my house they're getting a knife in the throat whether they're government or otherwise

That's how you get raided by SWAT. You might as well just kill yourself straight off.

This, you just got ear marked on the watchlist

>knife
Gun or go home, fag.

i'm a brit so that's kinda out of the question

Friendly reminder that popular method of wiping old hard drives with
dd if=/dev/urandom of=/dev/sda
can potentially put you in jail forever in the land of the free.

>yuropoor

If you're british, isn't a knife out of the question as well? You didn't bin it? Bobbies inbound with pepper spray.

most knives are not illegal. it's just illegal to carry one in public

Just purely curiosity now. You say "most knives". Are you like allowed to own a machete to cut back brush on your property and stuff?

Why?

>brit
>having a knife

>a hidden volume
So why doesn't everybody use this?

It looks like an encrypted data container.
If you are erasing drives, do a random then a 0 fill.

Or better yet, don't fuck with security agencies, don't interact with anyone, don't become friends with anyone.

it depends entirely on the blade. if it's legally classified as a sword then it's likely illegal, otherwise it's fine providing you don't carry it in public.

Was this only legal because he is a police officer? This is unconstitutional andnviolates the 4th and 5th amendment

Damned if he does, damned if he doesn't.

I'd choose the lesser of two evils and resign myself to being locked up for no real raisin (fault of the legal system) instead of having put myself there.

If you have the us alphabet, case sensitive, and 0-10 you have 62 possible options for each char in the password. If you have a password that's 20 chars long you will have 62^20 possible combinations.
According to this dude
quora.com/How-fast-could-the-worlds-fastest-supercomputer-brute-force-crack-a-password-Could-anyone-provide-a-spreadsheet-with-how-fast-the-worlds-fastest-supercomputer-could-break-a-password-that-is-1-2-3…100 -characters-long
some super computer can test 38,360,000,000,000,000 keys per second.

Then it would take at most 62^20 / 38360000000000000 seconds to crack it.
That's (62^20 / 38360000000000000) / (3600 x 24 x 365) = 582302405959 years.

Cracking good passwords is slow...

He thinks he can outgun these guys.
You might take one of them with you, maybe.

Allah snackbar

>It's like calling a teenage girl a terrorist/pedo for not wanting her parents to read her diary.
Grounded indefinitely until she surrenders the code to the diary.

inshallah

No one can force you to give up a key you don't know yourself.
- make an encrypted partition
- make the password a long string of gibberish no one could possibly remember
- keep the password on a usbstick, copy and paste to open the encrypted partition
- if the knock comes at the door, destroy the usbstick
- the data is lost forever to all mankind and no power on earth can bring it back

You worded that more complicated than it needs to be.

Most encryption things support keyfiles without the use of a regular password. Just make one and keep no other backups.

This is a little different.
In this case they have a witness that there is cp on the drive.

How does the hidden volume hide from the maximum size of the hard drive? If I tried filling it up with a folder of Gary Busey pictures to hit the drive size limit and it hit it halfway of what it should have been, that would be an indicator, right?

>It's the police, open up!
2 buckets of vaselin close to the door, poor it out for slippery goodness.
10L petrol can under desk, begin pouring over myself and the computers.
>Police breaks through the door.
Some of them falls, the others are slowed down by the bad dragon dildos hanging from the roof.
>Police comes to the entrance of my room.
Half of them die from the lego I placed out on the floor.
I light myself on fire while the policemen watches in agonising pain from the lego.
Shout out "I am your father Bob!"
Start running toward the police with an axe in the hand.
They immediately point there guns towards me, and in a futile attempt for more destruction I spray one of the police in his eyes and punch him in the nuts.
>The police shoots the me to death and escapes my apartment.
They never got my furry porn and the microwave I stole.

>man died shortly after being released from North Korea after severe abuse they deny they caused
Oh yeah, North Korea sure is in trouble. What now, more sanctions?

I think you can put in different passwords to get different volumes. Guess you have to be careful not to write to much data to it then.

You can’t own specific knives, that are considered lethal weapons. You could own gerber lmf’s or general bushcraft/hunting knives. But something like a ballistic knife, knuckle dusters etc. Shit that is designed as weaponry.

I'm thinking about it from the whitehat viewpoint. can you think of any other ways to find evidence of a hidden drive other than the previous mention? although, you could probably get around that really easily by printing a new label to replace the old one with the dummy drive value, right?

Find enemy, add hidden drive onto his comp, report him, sign affidavit, watch him rot in prison for eternity.

If you write too much to the outer volume the inner volume is corrupted and lost.

I honestly have know idea, hard drives aren't my specialty. Lock up the guy until he tells you the password for it?

kali.org/tutorials/emergency-self-destruction-luks-kali/

You only YOLO wonce.

The "outer" volume is only aware of the existence of the hidden one and protects its space from overwriting if you specifically instruct it to (for which you must know there's a hidden volume in the first place and know its key). With outer volume's key alone there's no way of proving the hidden one exists and yes, it can be overwritten with copies of gary_busey.jpg.

(checked)
"Plausible" deniability does not exist, for a commentary see gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions#5-security-aspects , §5.18
You could get the same "simple" deniability detaching headers of an encrypted container (or drive). I blame TrueCrypt for the plausible deniability meme.

If you're living in an oppressive regime and someone could use force against you to get the password, your only options is to be in such a position where you can't provide a valid password anymore. Something like github.com/hephaest0s/usbkill is a start (shut down could be replaced with LUKS header wipe), similar "dead man" switches could be devised & configured in 1,000 ways.

This guy gets it. On same cases the RAM gets frozen by liquid nitrogen so it can be duped as well. Pretty intense stuff goes on for the huge cases.

Live in a cave and shitpost using pigeon services and mushroom spores.

useless, coppers won't let you enter a password on anything but a forensically cloned drive if they're any serious about it. The LUKS headers shall destroy itself without any user interaction and before they get at it.

If he owns up to it, his conciliation is being a good citizen who believes in justice. If he denies it, he's looking at millions in a human rights tribunal against the US. That or a bullet in the head. Either way, unfortunately it's in his favor to dummy up.

Even the bad passwords are usually too much work to solve. I remember this year they caught one of the more prominent hackers out there and his password was his cat's name+12345

Destruction of evidence

so you could effectively ruin the hidden drive if you kept adding things to the public drive? The hidden drive would eventually have to start overwriting OS files, right?

Mate this isn't home alone

cold boot attacks are ancient side channel technique, truth be told nowadays if you succeed in shutting it down wipe will be unrecoverable in a matter of seconds, not minutes. There's TRESOR if you prefer to use CPU registries to handle the keys, this has some caveats and it's not even really kept up-to-date anymore.

if you live in eu. in usa they can put you in prison for the rest of your life if they want but you dont have to give the passwords.

>party van comes
>destroy usb stick
>lol ur goin to jail for destruction of evidence

Well then they managed to crack it didn't they?
But yeah, they are usually quite hard if you don't have them.

why not just let him go and have someone look after him and arrest him if/when he does something to children or is caught watching cp?

Not him, and I'm against this gimmick. But yes, one could mount the outer volume and fill it until it overwrites the "hidden" volume. It's usually still possible to mount the outer volume "safely", inserting the password of the hidden volume at the same time.

>cat's name+12345
Novices, it should be crackable in a matter of days with conventional attacks, decent taxpayers-provided hardware and minimal expertise using either hashcat or the jumbo OpenCL-enabled version of john
Passphrases ("correct horse staple battery...") are the only convenient way to foil attacks (and it's officially a NIST-approved way to craft password since few weeks ago)

>if you live in eu
Not in Sweden, at least haven't been the case yet. There was someone called the skeleton woman(had sex with bones) who refused to unlock her HDD and didn't get in trouble for it(the HDD part, got convicted for other stuff though).