Actually, there is no way to tell if the there is another encrypted volume in 
existence or not.  One might stipulate that there "could" be if the filesize is 
obvious, but when you get into gig size files that are storing small amounts of 
data, that argument loses value.

You actually cannot even prove that it is encrypted data at all.  Filename 
~021289a.dat could be encrypted data, but there is no way to tell.   What is 
more important in these cases is that one cannot prove that another volume 
exists.  One can, however, prove that the password was given and the data was 
decrypted.    If I have a 1 meg file that mounts to 200k, I don't have to prove 
anything about that.  I could have gotten the file from you, and you could have 
giving me that password that allowed me access. 

And this is where I think the danger of legal precedence comes in...  If this 
"sticks" and she is compelled to give up her password, the data retrieved means 
nothing, yet you and I have more of our constitutional rights infringed upon.  
To me, it is far more important to establish requirements for probably cause to 
exist on its own before using the presence of encrypted data as a means by 
which one can legally compel an alleged party to provide said evidence.  

@Christian, that is where I think the "solution" lies.  Otherwise, we will find 
ourselves in the same position as the UK- if they can't prove you are guilty 
with the evidence required for prosecution, then they have a back-up law where 
they can still put you in jail with no evidence at all if you don't give over 
your keys.   That is totally fuct IMO.  You can have a blob of binary data on 
your system, and if they claim it is encrypted data, and you don't give them 
the key to decrypt it, you can go to jail even if it is not encrypted freaking 
data.  

t

> -----Original Message-----
> From: Tim [mailto:tim-secur...@sentinelchicken.org]
> Sent: Tuesday, July 12, 2011 2:21 PM
> To: Michael Holstein
> Cc: Thor (Hammer of God); full-disclosure@lists.grok.org.uk
> Subject: Re: [Full-disclosure] Encrypted files and the 5th amendment
> 
> > > Tim, I actually use TruCrypt now to do exactly what you speak of.   I pre-
> allocate a fixed virtual disk, and use one passcode for one section of data 
> and
> a different passcode for a different section of data.   It is impossible to
> determine if the disk is set up in this manner, and impossible to tell which
> section of data is being used.   It is actually quite easy to do.
> > >
> >
> > All fine and dandy until the authorities say "Your honor, the
> > defendant is using nested encryption, we didn't find the
> > $self_incriminating_evidence so he obviously hasn't complied with our
> > request".
> >
> > double-edged sword.
> 
> 
> Yeah, exactly.  Any investigator worth their salt will be able to tell the
> partition that got decrypted is not big enough to account for encrypted disk
> space.  That's where the one-time pad can create true plausible deniability, 
> if
> used correctly.  Any ciphertext of length N can decrypt to any plaintext of
> length N.  Too bad it is too much of a pain to implement in practice.
> 
> Thor: maybe you could make the investigator's job harder through a
> combination of compression and encryption with a similar dual-partition
> scheme as you're using with trucrypt.
> 
> tim

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to