Why do people wipe free disk space or wipe a disk 3 times to permenantly erase deleted files when they could just make a super long password and FDE encrypt the drive they want to delete files on?
>>61169570
what?
>>61169585
Best way to hide something forever is to FDE the drive and forget about the password, no need to nuke the drive or use bleachbit for example.
>>61169598
>your house raided and they took everything in
>FBI wants you to unlock that drive
>answer "i don't remember the password'
>jailed for lifetime until you unlock that shit
>actually don't know the password
>jailed lifetime because you are being smartass
>>61169635
I don't live in Britain, Ahmed.
>>61169643
>FBI
>Britain
well looks like you are lifetime jailed in a "special" prison already
>>61169598
If you're doing that to wipe the drive it's basically the same thing as wiping it.
>>61169692
Then why do people use Nuke and Boot or bleachbit to wipe free space when it takes forever. Nuking a drive with 1 and 0's takes like an hour. Formatting and FDEing a drive with Luks takes 15 seconds max.
>>61169570
>wipe a disk 3 times
wiping a modern used drive with zeroes is good enough by far, the only reason to do multiple passes is if you have several days for it to complete - nothing to lose, potentially (minimally) something to gain
>when they could just make a super long password and FDE encrypt the drive
because then you have to have exceptional opsec for both the header files and the passphrase
pic VERY much related
>>61169598
>Best way to hide something
encryption doesn't hide shit, it prevents people from accessing it and additionally using it as further evidence
if they know you've downloaded kiddie porn they'll lock you up indefinitely until you give them the passphrase
>>61169643
https://nakedsecurity.sophos.com/2016/04/28/suspect-who-wont-decrypt-hard-drives-jailed-indefinitely/
https://www.eff.org/deeplinks/2012/03/tale-two-encryption-cases
https://en.wikipedia.org/wiki/In_re_Boucher
even in the states, the bastion of free speech, it isn't the case that you can walk away free after refusing to give up your keys
>>61169570
3 times does nothing, FBI can read at least 7 layers deep using an electron microscope.
>>61169785
and what are they going to see with a electron microscope ?
>>61169643
>FBI
>Britain
>>61169570
Why would you do this, it's still possible, but highly unlikely it could be cracked, just take the hdd out, smash the plate, you're untouchable.
>>61169754
I'm not sure I understand the image.
So basically in 2009 usb storage devices were being made that had wireless capability and will connect to any wireless network and load malware onto the machine? Its mainly a tool to access machines not connected to the internet?
>>61172182
And those devices have code on them able to break into any wireless network?
>>61169754
>even in the states, the bastion of free speech
Kek
>>61169754
>https://nakedsecurity.sophos.com/2016/04/28/suspect-who-wont-decrypt-hard-drives-jailed-indefinitely/
wow a brit and an american arguing about who is the most free
(I feel a bit more bad for the brit than the american)
so regardless of this is true or not, in a way I can see the distinction between being compelled to do something like open a door or provide an object hidden somewhere, and a testimony where you provide information.
but is not encrypted content unintelligible, and as EFF puts it, producing a key (or otherwise translating the information to a readable state, e.g by unlocking it yourself under supervision) would be considered testimony once you hand over the device with the now intelligible information?
It seems like judges are just lawyering their way around this.