Trezor's "plausible deniability" scheme could very well result in you going to
jail for lying to border security, because it's so easy for them to simply
brute force alternate passwords based on your seeds. With that, they have proof
that you lied to customs, a serious offense.
The passphrase scheme as I understand it allows a maximum of 50 characters to be used.  Surely even with the HD seed, that search space is too large to brute force.  Or is there a weakness in the scheme I haven't clocked?

On 09/01/18 01:13, Peter Todd via bitcoin-dev wrote:
On Mon, Jan 08, 2018 at 07:40:38PM -0500, Rhavar via bitcoin-dev wrote:
I think you're under-appreciating how useful the "plausible deniability". Someone I know 
was (solo) traveling to the United States when a border agent asked her to unlocked her phone; 
thumbed through her apps, ended up finding tinder and went through all her recent conversations to 
make sure she wasn't involved in any "pay for sex things".

In the same light, I travel frequently and constantly have my trezor on me. If 
I am asked to unlock it, I will have no problems doing so (as refusal will no 
doubt lead to deportation) and showing my personal wallet (which sadly hasn't 
had much use since fees became ridiculous).
Trezor's "plausible deniability" scheme could very well result in you going to
jail for lying to border security, because it's so easy for them to simply
brute force alternate passwords based on your seeds. With that, they have proof
that you lied to customs, a serious offense.

I would strongly advise you not to use it in that situation.



_______________________________________________
bitcoin-dev mailing list
bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev

_______________________________________________
bitcoin-dev mailing list
bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev

Reply via email to