Post by nemo_outisAs I said earlier, I know that I have no prospect of
convincing a true believer like you that plausible deniability
is next to worthless. I can only hope my cautions will be
taken to heart by those less rash and more prudent than you.
If you stopped pontificating you might understand that there is no
need to try to convince me thus, because, my haughty friend, you are
wrong. In other words, why don't you try getting off your high horse
and listen?
Post by nemo_outisIf it were just you, I would simply drop the matter and merely
"Never try to teach a pig to sing; it wastes your time and it
annoys the pig.”
Ah, we have a similar saying, "Don't put perfume on a pigs ear". In
your case, it still smells like pig.
Post by nemo_outisBut you may mislead others with your zealotry and so I post to
warn them.
A zealot? As I said in the last post, go to Truecrypt forums where
much more knowledgable people than you, and I for that matter, will
tear you to shreds in a much quicker and more complete manner than I.
For those who are following this, I do insist you go to Truecrypt
forums (google) and read some of the information there. It still
won't be too simple to set up your two partitions, especially getting
the sizes right, but you will see just how superior an encryption
package TC is. Whatever you do, don't listen to this guy, he is
probably arrayed with some three letter agency in the US whose design
is to scare the less initiated off from useing TC, which is
impenetrable.
Post by nemo_outisBut that does not mean that I will continue to answer endless
objections which are mere repetitions and elaboration of
points you made earlier. As a judge will say to a lawyer who
adopts such a lame approach, "Asked and answered, counsellor -
move on."
And you are a judge now, my salubrious friend? Let my scalpel now
dissect your ruminations, deceptive though they be.
Post by nemo_outis"Plausible deniability" is a marketing ploy by encryption
vendors, not a realistic strategy for personal security.
The term has been around since the mid-80's and is a realistic
strategy for personal security. As I said, TC is used all over the
world, point out one example of a hidden volume being identified to
the satisfaction of any court in any country. Just one example.
Post by nemo_outisÂ…
Post by thang ornithorhynchusPost by nemo_outisSpeculative and conjectural on your part, but let that
pass.
Speculative = conjectural (redundancy) but let that pass
too.
A silly and stupid objection on your part.
And, no, silly and stupid are no more synonymous than
speculative and conjectural are. English has more subtlety
and range than you appreciate.
Oh, I can see that you are trying to be articulate, but you are only
succeeding in being verbose. English, when properly used and applied,
can actually be an elegant language - something which will probably
escape *your* appreciation for the forseeable future. By the way, my
silly and stupid objection on my part was in response to your
startlingly obtuse usage of HM's english.
Post by nemo_outisPost by thang ornithorhynchusPost by nemo_outisAs my response to the OP showed, I usually discuss these
matters in alt.privacy, alt.computer.security, or
sci.crypt. But since the matter arose here I pursued it
here. And I have continued to pursue it here even as it
wandered far from the original topic.
In no wise has it wandered far from the OP's link (TC).
Whether plausible deniability will fly has sweet fuck all to
do with firewire attacks on RAM.
You are a prickly old fart, ain'tcha? Here was my polite response to
your first response to the OP (third post on this thread).
"This is true, the "attack" is simply picking the password out of
memory. The best method to avoid this is to disable firewire
(IEEE-1394) in BIOS rather than in the OS, which is equivalent to but
preferable to disconnecting the port on the mainboard. This is
because to reset BIOS the adversary needs to reboot the OS thereby
wiping memory.
So far, at least until the advent of practical quantum computing, TC
is unassailable on an unbooted PC."
You, mr seat-of-all-knowledge, then went on to try to destroy my
statement that TC was unassailable on an unbooted PC. That pompous
meandering by *you* resulted in where we are now, namely, you trying
to salvage your reputation as some sort of oracle of encryption.
Post by nemo_outisTruecrypt is also susceptible to video observation of password
entry but that wouldn't mean discussion of "Avatar" was on the
same topic.
Â…
Post by thang ornithorhynchusPost by nemo_outisI don't think you quite get it - you have allowed yourself
to be dazzled by the technical details. The *mere
presence* of large quantities of random data - even without
absolute proof - will be viewed as a near certainty that
encryption is being used. And use of a crypto program that
supports hidden volumes will cause considerable credibility
to be attached to the likely use of that feature.
Overwhelmingly so if other circumstances (e.g., why you are
being investigated in the first place) are consonant with
this.
Good lord. Do you believe in rule of law? Rules of
evidence? Here in Australia, if the encryption cannot be
cracked, there is no evidence, therefore there is no case.
http://www.tomsguide.com/us/PC-Camera-Encryption-Video-Peeph
ole,news-4910.html
1) This case has *absolutely nothing* to do with plausible
deniability - the encryption was of the plain ordinary kind.
It was the closest possible thing, which was OTFE (whole disk
encryption, the police couldn't get into the OS). Using your
reasoning, which is the use of one implies the use of the other (the
other being a hidden volume), aren't the odds in favour of their being
also a hidden volume? Seems to me that encryption works, and they
didn't even get to the stage where they could determine the existence,
or non-existence, of a hidden volume.
Post by nemo_outis2) The fellow was *convicted* and jailed.
Here is the link again, it got truncated for some reason:
http://www.tomsguide.com/us/PC-Camera-Encryption-Video-Peephole,news-4910.html
From this, if you read for comprehension, you will see he served time
in lockup on remand (ie *before* he was convicted) then he was put on
probation - *not* jailed!
Also, he was not convicted of the original allegations, which if the
police had been able to crack the encryption, he would have been.
Post by nemo_outisPost by thang ornithorhynchusOf particular interest to me, and it should also interest
you, are the comments on Truecrypt, especially the
"If you're savvy enough to encrypt your harddrive, then I
suspect a criminal in the UK would simply use Truecrypt's
hidden encrypted volume feature. That way, he could give
the police one key, after putting on a good show of
refusing to comply, and they would still have nothing to
charge him with.
In the U.S., they are still debating the legality of trying
to force someone to give up an encryption passphrase. The
5th Amendment of our Constitution provides, among other
things, protection against self-incrimination. Defense
attorneys have taken the position that the contents of
someones own mind, to include encryption passphrases, are
thus protected. While I hate to see criminals get away with
things. From a privacy standpoint, I believe this is a
correct interpretation of the law."
My point *exactly*.
And I think that "waxdart," like you, is misinformed and
wildly speculating.
Sure, and many many more where he and I come from. The odds are
against you being right, and I should know, I'm an actuary
(mathematical statistician).
Post by nemo_outisFWIW I can ostensibly **fully decrypt** A truecrypt container
- absolutely 100% - as I've recently posted in sci.crypt. and
yet still not have revealed the secret contents!
And that method too - although it works *perfectly* and goes
*far beyond* mere plausible deniability - is, like plausible
deniability, mostly just an interesting but worthless
curiosity.
You are again, *not* reading for comprehension. Regardless of your
claims, I am talking about VOLUMES, not containers. I am specifically
talking about firstly finding the damn volume, when it is buried
within a second, adjacent partition. The secret, and please read this
and read this again, is that the hidden volume cannot be, under any
circumstances, found. So, you hand your passphrase over to TLA for
the decoy OS (encrypted of course), and they say, well there is a
second partition here, we suspect that is TC as well, and you put up a
fuss etc, but then hand over the second passphrase for the outer
volume on the second partition. Yet, there is a third passphrase, for
the hidden volume on the second partition, which cannot be identified.
I think that after handing over two passphrases, no judge on earth is
going to believe (reasonably believe, in Australian law - the
Cybercrime Act 2001 as amended) that there is a third passphrase to be
handed over, for something unidentifiable.
See, your problem is that you haven't, and can't, tell me or your
audience how to identify that there is indeed a hidden volume on the
second partition. That's my challenge to you. If you can tell me
how, technically, the hidden volume can be identified, either from the
headers, the nature of the bits on the volume, or whatever, then you
will have converted me. You won't do it though, because it can't be
done.
And, unlike you, I don't have an agenda, so I am truly open minded to
proper discourse and argument.
Post by nemo_outisPost by thang ornithorhynchusPost by nemo_outisSure you can deny it, sure you can scream "You can't
absolutely prove it!" but that may cut very little ice.
Many a man has been hanged for murder even though the body
of the victim was never found.
Rubbish. Perhaps in the 1800's, but this is the third
millenium...as the story above shows, the courts need
evidence. TC's hidden OS is indiscernible even on bit by
bit inspection. Only the Evil Maid attack, freezing the
RAM, camera in roof vent etc etc works.
You continue to think that "absolute proof" is necessary.
Good for you.
In fact, I'm so confident in your position that I'd bet *your*
ass on it!
Wrong again. I didn't mention absolute proof, and I don't even know
what you are talking about here. That term does not exist in law. I
was talking about the evidence in the citation provided by me.
Post by nemo_outisÂ…
Post by thang ornithorhynchusNo its not. I am degreed with practical background in law,
briefed Counsel many times etc etc. Might be rusty, but
not shallow.
You're the fellow who said that "reasonable suspicion" and
"probable cause" only applied in the US. You're not just a
little rusty - corrosion has destroyed all the metal!
I have never pretended to practice or to apply law in any other
country than Australia. You are practicing the black art of double
speak.
Post by nemo_outisPost by thang ornithorhynchusPost by nemo_outisSecond, the standards of "reasonable suspicion" and
"probable cause" are widely used OUTSIDE the US in MANY
common-law jurisdictions. I can, for instance, cite cases
from the Canadian Supreme Court addressing these exact
topics.
Not here in Australia they ain't, sport. And we are common
law to the marrow of our bones. Again, refer to the link I
posted above. No mention of these mealy mouthed words,
just a lack of evidence because the coppers couldn't crack
the encryption. And that was encrypted containers or just
files, let alone invisible, indiscernible hidden TC
volumes!
I think you know as much about law, including Australian law,
as, again in the words of my Dear old Dad, "my arse does about
shootin' peas."
You'd be surprised what I know about law, but what you know about law
wouldn't surprise me in the least.
Post by nemo_outisYou cited a case that has absolutely nothing to do with
plausible deniability, a case in which the defendant was
convicted, and yet you think it's somehow supportive of your
position.
Hang on buster, didn't you say above he was also jailed? Which he
wasn't. You are exhausting my patience - once again, I was discussing
the fact that this fellow had a fully encrypted OS, they couldn't even
get into his HD, and he was not convicted on the original charges
because they couldn't decrypt the alleged evidence (videos etc). He
was convicted on lesser charged, and not even jailed - given
probation. This shows how impregnable a hidden volume is, because
they couldn't even get past the first layer of encryption, what TC
describes as the "decoy os". Therefore it not only works, it works
under pressure. More so than your ridiculous virtual machines and so
on.
If you can, I suggest you try and set up for your own trial the unholy
trio, decoy, outer and hidden volumes/os. You will see what a fine
system it is. If you need help with the mathematical aspects (size
balancing because of the journalling by NTFS), just yell and I'll drop
everything a help you out.
Post by nemo_outisPost by thang ornithorhynchusPost by nemo_outisAs for civil matters, yes, the standard in many common-law
jurisdictions is "balance of probabilities" or
"preponderance of evidence." But what you may not fully
realize is how often criminal and civil cases are
conjoined. For instance, it is very common in copyright
matters to bring both criminal *and civil* processes, with
the civil case frequently being won even though the
criminal case wasn't. (The most famous example of the
criminal/civil duality is, of course, the O J Simpson
matter.)
This happens infrequently, when for instance a person is
clearly guilty of an indictable offence which cannot be
proven beyond reasonable doubt due to incompetence, for
instance, or tampering with evidence (per OJ). It is
infrequent because in most such cases, there is no party to
undertake the civil action (at the lower burden of proof)
or that party is unwilling to do so. It is an extremely
infrequent occurrence here in Australia.
Oh dear. "Clearly guilty of an indictable offence which
cannot be proven" And this from the fellow who professes to
trust in the legal system. It is to laugh!
Silly man. Surely you can intuit what I mean, which is that OJ was as
guilty as hell, but due to evidence tampering, they couldn't convict
him (the detective, I can't remember his name, but he tainted the
entire prosecution case). It couldn't be proven at all, but he was
clearly guilty, as most of your colleagues in the US would agree.
Post by nemo_outisAs for your knowledge of the frequency of such civil cases in
Australia, let me repeat my father's "peas" remark above.
Please don't. Try to restrain yourself.
Post by nemo_outisPost by thang ornithorhynchusPost by nemo_outisPost by nemo_outisBut there is a bigger problem with encryption in civil
matters. In civil matters there is generally some form of
disclosure or discovery procedure. If one of the litigants
fails to be *fully forthcoming* or appears (in the
estimation of the judge for which he has very wide
discretion) to be evasive, furtive, or unresponsive (not a
question of what the discloser *must* do but what he
*should* do) then the case will be automatically be decided
against him! I've seen this happen in cases in which I've
participated. I'll be happy to quote the legal principle
in Latin if you think that would help :-)
I just love pompousness in all its forms, because the
pompous fool has so far to fall (and fall they do!).
Firstly, if there is a necessity, perceived or otherwise,
for OTFE at the sophisticated level of decoy, outer and
hidden volume, then we are most decidedly not talking about
civil action are we? Why? Because simple encryption of
files will suffice for whatever is potentially litigible at
the lower level of proof (balance of probabilities) because
the person bringing the suit will not have the full force
of government on side. Civil action is generally one
private person against another. No NSA, no police and so
on. TC would only be used for instance by persons in fear
of powerful adversaries who still need observe the rule of
law, such as federal police forces, security organisations
(such as NSA, CIA, our ASIO, etc) and so on.
No! I suggest you reread what I wrote. (I'd type slower but
I doubt that would help you)
Now you *are* being silly. Yet, you seem to agree with my remarks
about pomposity.
Post by nemo_outisPost by thang ornithorhynchusSo, as we are not discussing TC and its complexities in the
context of civil litigation, there is no need to quote your
principle in a dead language to me.
The point you made is only relevant on the very low burden
of proof so is not relevant to this discussion of TC
(again, because there is no need to use the hidden
volume/hidden OS for simple, run of the mill civil
lawsuits).
I believe civil suits are very relevant. Dismiss them as
cavalierly as you do all else. As I said before: It's your
ass.
Why do you believe in the context of double or triple layered
encryption that civil litigation is apt? No indictments, no TLA or
LEA, resources generally limited to less than state coffers, etc etc.
Copyright? Its a crime, not civil. Naughty videos of the neighbours
wife? Its a crime, not civil. Give me an example, explicitly please,
of civil litigation where triple layered encryption might be involved.
Post by nemo_outisPost by thang ornithorhynchushttp://www.theregister.co.uk/2009/11/24/ripa_jfl/page2.html
"Police then warned him they would seek a section 49
notice under
RIPA Part III, which gives a suspect a time limit to supply
encryption keys or make target data intelligible. Failure
to comply is an offence under section 53 of the same Part
of the Act and carries a sentence of up to two years
imprisonment, and up to five years imprisonment in an
investigation concerning national security."
Some points. Firstly, his encrypted files were just that,
files. They were not hidden, they were obvious. Secondly,
where is the reversal of the burden of proof? They asked
for the keys, he didn't provide them, he was jailed. The
law says he must provide key, and he didn't do it. If he
had had a hidden TC volume, and given up the decoy
passphrase, he would have complied with the RIPA
requirement and not have gone to jail. This, by the way,
was an indictable offence, not a civil misdemeanour.
Once again you idiotically cite cases which destroy rather
1) The case had absolutely nothing to do with plausible
deniability but rather with plain old vanilla encryption
You are citing me out of context. I know it was containers, files
encrypted with vanilla flavour, but that wasn't my point. Here is the
Post by nemo_outisNow I could point out that I've been speaking broadly of
common-law principles, but in most jurisdictions these have
generally (but not totally) been supplanted by statutory
equivalents. The statutory equivalents usually are more or
less "equivalent" but they do sometimes introduce new
"wrinkles" - in extreme cases they can, for instance, entirely
reverse the burden of proof, as with the UK RIP law.
My response was to your statement that RIPA reverses the burden of
proof. I clearly showed with this citation that (a) the RIPA was
applied; and (b) there was no indication anywhere that the RIPA
"reversed the burden of proof" as you asserted.
Why did you snip this out?
Post by nemo_outis2) The fellow, despite it being the first case of its kind,
despite the fellow being a raving loonie, and despite the
judge cutting him the slack of not considering him a threat to
national security, **WAS CONVICTED AND JAILED!**
So what? My point was that there was no reversal of the burden of
proof, as you asserted. You selectively snipped out your comment, to
which I was responding. Simply, plain encryption was discovered and
identified, he was required by law and in due process to hand over the
password, he didn't, and he was jailed. No reversal of the burden of
proof, so you are wrong (again).
Post by nemo_outisPost by thang ornithorhynchusPost by nemo_outisI can also point out that there are other legal (and quasi-
legal) processes beyond civil and criminal matters, such as
regulatory and administrative ones. The classic example
here is customs where they can, in practice, do whatever
the fuck they want without even meeting the minimum
standard of "reasonable suspicion."
Bullshit. Here in Australia Customs has started peering
into laptops, phones etc on the basis of stopping the
importation of illegal porn. There is the usual outcry by
people who don't understand that such stuff has always been
illegal and specifically, a banned import. Customs could
always have peered into laptops, but is doing so now by
adding an extra box on the on-board questionnaire. Thus,
this is quite the opposite of what you assert.
http://www.abc.net.au/news/stories/2010/05/21/2905424.htm
1) Do you not understand that customs, including Australian
customs, can look into laptops etc. at their entire whim and
discretion - JUST AS I SAID
Isn't that what I agreed with above? Read it again, there is no
argument. However, its only because of the nature of what they are
looking for, which is a banned import (whether it is there or not). It
is in accordance with regulations, not something they can do ultra or
mala fides (sorry, lapsed into a dead language there :).
Post by nemo_outis2) Do you not understand that the requirement to declare
pornography is yet another layer of "piling on" that can be
used to arbitrarily crucify you if the government so wishes?
Do you not understand that it is not arbitrary? It is a prohibited
import, under several jurisdictions (state, federal). That empowers
Australian Customs Service to look at electronic devices, they have
always had that legal **power**.
Post by nemo_outis3) Do you not understand that this has *absolutely nothing*
to do with plausible deniability?
It does if they find an encrypted partition on your laptop.
Post by nemo_outis4) Do you not understand that this is yet another proof that
government and law is arbitrary and uncontrolled, an exercise
in naked raw coercive power, and that any public good is mere
lip service?
Rubbish. You must be an expert witness for the defence, because you
don't have the correct state of mind for the other side. This sounds
like conspiracy theory to me, especially in this day and age when
stinking terrorists took out America's two front teeth!
Post by nemo_outisAnd yet you believe in the rule of law. Well, good for you.
It takes real stick-to-it-ive-ness to continue to believe in
the face of mountains of evidence to the contrary.
Yes I do. Even in your country, I would believe in it (yes, I have
been all over the US, even down to Louisiana).
Post by nemo_outisI've made my points for those with wit enough to understand.
You, of course, may continue to believe whatever you wish.
You still have not responded to my main points in the penultimate
post. Your snippers are out again. Those points are, and I challenge
you:
1. Are you an encryption expert and if so, what are your
qualifications? I'm an actuary with a passing interest in encryption.
My knowledge of the law comes predominantly from civil insurance
cases, with a salting of the other. Whence yours?
2. Can you point to one case involving TC where the hidden volume
has been discovered? (or even DCPP)
3. When you take your arguments against OTFE with hidden volumes over
to TC fora, can you let me know please so that I can follow
proceedings?
Post by nemo_outis...
But, just as Cato used to end all his speeches with "Carthago
delenda est" I will again remind more open-minded readers that
"Plausible deniability isn't!" Trust in it at your peril.
Fuck Cato and Scipio and all the rest, they have all been dead for 2K
years. Something more useful for you to ponder, perhaps, is this
thread. Please note the sage comments under Peter's post.
http://www.peterkleissner.com/?p=11
This is the only way really to penetrate TC because until TC 6 came
along, even Bruce Schneier could only pick on leakage from an
encrypted container to unencrypted (that's fixed now with 6, there can
be no leakage whatsoever from the hidden OS as all writing outside of
that volume is prohibited).
thang