Jump to content
Not connected, Your IP: 35.172.111.215
rebellatio

You may cross the border, but your phone or computer will not.

Recommended Posts

How would this apply to a laptop or phone with full disk encryption?

 

I mean, you could just toss it to them and say "Okay, have fun with VeraCrypt" 

 

They can search it all day long, it does nothing if it's impossible for them to see the data. 

Share this post


Link to post

They won't be able to decrypt it, but most likely they will permanently confiscate it simply out of spite.


During times of universal deceit, telling the truth becomes a revolutionary act. —George Orwell

The further society drifts from truth the more it hates those who speak it. —George Orwell

A lie is as good as the truth when everyone believes.

No one ever lost a dime underestimating the intelligence of the amerikan public. {Generally attributed to H.L. Mencken}

THANK YOU: Russia Today; Edward Snowden; Julian Assange; John Kiriakou; Thomas Drake; William Binney; Ray McGovern; Kirk Wiebe; Matt Taibbi; Sputnik News

Share this post


Link to post

They won't be able to decrypt it, but most likely they will permanently confiscate it simply out of spite.

 

So the government can steal my property because they cannot see what is on it?

 

Great. 

 

What do they even do with permanently confiscated electronics? Format them and watch porn in the back room during lunch break? 

 

I mean, shouldn't that be against some law? 

Share this post


Link to post

Look... I don't know for a fact that the TSA morons will definitely confiscate your device if you don't provide the password. But I think it's possible, and perhaps likely. They have a ready made excuse: "We're confiscating this device in the interest of national security." Then they might say you can retrieve it at an unspecified later date and it will be totally up to you to navigate the labyrinthine bureaucracy. The chances are good that either it will be stolen by a TSA assclown or dumped in a storage room somewhere, making it impossible to locate. And believe it when I say that NO ONE will give a f*ck if you never see your device again. It is an undeniable fact about human nature that anyone with any degree of bureaucratic power over the minions will exercise that power as far as he/she can push it. We've all seen displays of this kind of shallow arrogance known as a petty power trip. 


During times of universal deceit, telling the truth becomes a revolutionary act. —George Orwell

The further society drifts from truth the more it hates those who speak it. —George Orwell

A lie is as good as the truth when everyone believes.

No one ever lost a dime underestimating the intelligence of the amerikan public. {Generally attributed to H.L. Mencken}

THANK YOU: Russia Today; Edward Snowden; Julian Assange; John Kiriakou; Thomas Drake; William Binney; Ray McGovern; Kirk Wiebe; Matt Taibbi; Sputnik News

Share this post


Link to post

That's why Veracrypt uses a second decoy operating system. You give them the password to the decoy os. IF you've followed all the security procedures, they won't be able to tell that there is a second hidden os where your real data and history is. Unless you're on some watch list, for the purpose of border crossing, I imagine that just booting it to the decoy will be sufficient.

Share this post


Link to post

That's why Veracrypt uses a second decoy operating system. You give them the password to the decoy os. IF you've followed all the security procedures, they won't be able to tell that there is a second hidden os where your real data and history is. Unless you're on some watch list, for the purpose of border crossing, I imagine that just booting it to the decoy will be sufficient.

 

I seem to recall seeing that in installation, I'll have to enable that when i install it on a laptop. I currently only have it on my desktop, as all of my laptops are shitty and practically useless. 

 

As you can imagine, that won't be going across borders anytime soon. 

Share this post


Link to post

 

That's why Veracrypt uses a second decoy operating system.

 

Very useful.

 

Even for someone coming from Kepler 452b.

 

Kind regards

 

 

I wish a good coder would write something just like it for Linux.  I have seen advanced coders hint that its quite possible, but nobody I know or trust has ever presented a linux OS software with a hidden OS option.  Perhaps a "marriage" of talent with VeraCrypt's hidden volume technology and some on the Debian team or whoever.  The linux flavor of VeraCrypt works great and the source code is an easy build using Linux.  I would gladly pay for such a piece of software, and I know I am not alone on this.  While VeraCrypt is great (the linux handling of my volumes is nearly flawless), I can't bring myself to switch to a hidden OS using Windows, because its a "leaker" of an OS, with too many components cloaked behind closed source construction.  My intention is to never return to Windows as my hobby machine.  I'll keep one running just to stay in touch, but I'ld never come here with it, as an example.  Sure as can be many members will disagree and that is their right.  Won't fight you over your feelings on the subject.  Won't agree with you either.

Share this post


Link to post

Friends don't let friends use Windows.


During times of universal deceit, telling the truth becomes a revolutionary act. —George Orwell

The further society drifts from truth the more it hates those who speak it. —George Orwell

A lie is as good as the truth when everyone believes.

No one ever lost a dime underestimating the intelligence of the amerikan public. {Generally attributed to H.L. Mencken}

THANK YOU: Russia Today; Edward Snowden; Julian Assange; John Kiriakou; Thomas Drake; William Binney; Ray McGovern; Kirk Wiebe; Matt Taibbi; Sputnik News

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...