this post was submitted on 21 Aug 2024
125 points (96.3% liked)

Privacy

31182 readers
521 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] ShortN0te@lemmy.ml 16 points 3 weeks ago (19 children)

That is the point. They cannot find it. Yes they can try to force it out of you but then they would need to know it is there.

When you get searched for drugs and they do not find any, what does lea do?

[–] umami_wasbi@lemmy.ml 11 points 3 weeks ago* (last edited 3 weeks ago) (11 children)

The point is they don't have to proof if a piece of random data is indeed an encrypted blob.

Imagine you passing border security and got selected for search. They found a piece of data on your device with high entropy without known headers in the wrong place. You can claim you know nothing about it, yet they can speculate the heck out of you. In more civil nations, you might got on to a watch list. In a more authoritive nations, they can just detain you.

They don't have to prove you hiding something. The mere fact of you have that piece of high entroy data is a clue to them, and they have the power to make your life hard. Oh you said you deny them for a search? First congrats you still have a choice, and secondly that's also a clue to them.

For more info, read cryptsetup FAQ section 5.2 paragraph 3, 5.18, and 5.21. It is written by Milan Brož who is way more experienced than me on this matter.

[–] NeuronautML@lemmy.ml 3 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

I think you overvalue the skillset of border security. This may seem trivial to you but it's uncommon to hire people trained to this level of competence and put them at every point of entry. A decent cybersecurity investigator needs a big salary.

That would probably happen if you were already a suspect of something or a high profile person and they moved in resources for you. No way border security is randomly sweeping for headers and entropy, they basically just look at it with the explorer and clone it, possibly using some software to scan for known security vulnerabilities to access encrypted parts. That would be a court ordered search or a high profile crime investigation, or maybe a really really unlucky day where the expert was already there for another reason, but the rest i agree.

If your threat model makes you a high profile person, then smuggling data in hidden containers is definitely not the best solution. A non associated personal cloud server is best.

[–] umami_wasbi@lemmy.ml 2 points 3 weeks ago (1 children)

Is it really though? I would assume there would be automated systems that can do 80% of the job. It can be as simple as a USB key holding a portable executable that can run and connect to a remote system and report back the findings which the officer can just read the report in plain English. Training, of course, is expensive and rarely do so, but automation can get somewhere close relatively inexpensive.

[–] NeuronautML@lemmy.ml 2 points 2 weeks ago* (last edited 2 weeks ago)

Even if such a thing existed, which given the analysis parameters makes it far too complex for automation (like for instance, how would such a software distinguish between old deleted data still residing in empty space and a vault file hidden in empty space without a follow up analysis of the data itself. It would probably alert the user for something, but the amount of false positives would probably lead an untrained user to ignore the alerts eventually) i would guess it doesn't, but if it did, it would have to process petabytes every day, from all over the country and the system would have to be maintained, which going by government record of informatics systems, doesn't seem likely that it would be readily available for everyone that gets stopped at a border stop consistently. It's like an anti virus search, with all the false positives it comes up with, but 100 times slower, plus the transmission of the entire disk clone file, plus the cloning process itself.

Moreover the cost of maintaining such a system when 95%+ of the population doesn't have the know how to use complex data obfuscation measures and LEO rarely obtains information out of these cursory searches for arrests. On published news articles LEO always ends up using snitches, google searches or usage of the TOR network in a given area to catch criminals. Data forensics only come into play later on. Presumably, dollar for dollar, they would probably invest in what works best instead of casting such a wide net.

In sum, I'm not cleared to know such information, but i am guessing such a thing, while technologically possible, seems economically unfeasible and liable to be used only in specific cases. If i had a border security budget, i would certainly not invest in a mega server to swift through every bit of empty and occupied space of all the randomly selected people for a search that come in through the ports of entry. However i could be wrong.

load more comments (8 replies)
load more comments (15 replies)