The Minnesota shooter allegedly researched several “people search” sites in an attempt to target his victims, highlighting the potential dangers of widely available personal data.
A text file encrypted with aes-256/gpg on a usb drive with a hidden veracrypt volume that also have a decoy encrypted veracrypt volume is essentially uncrackable even by state actors unless you give up the passphrases or use some dumbass passphrases that are easily guessed.
This is the kind of shit where if you have critical evidence on the drive they’ll hold you: there was a police sergeant in Philly who (probably) had child porn on his macbook. They couldn’t prove it becuase his drive was encrypted and he refused to give up the passphrase. He was held for four years on contempt charges and they finally gave up. He wasn’t even using an esoteric approach, he just had macos filevault turned on
The approach I described sidesteps that issue because it creates a decoy encrypted veracrypt for them to find and for you to give up. The hidden veracrypt with your salacious details is a volume that is created within the free space of the outer volume so it essentially undetectable unless you give it up and by design you give up the outer volume that shows innocuous data. Of course, having veracrypt at all invites suspicion of a secret volume but this puts you in the above spot: catching a few years with no real charges for refusing to give yourself up. Much better spot than catching charges for whatever crime (or being executed for political activism/journalism/etc)
Meanwhile this guys journals were immediately found and well documented for his federal complaint. You could just burn them I guess but then you no longer have all your data
A text file encrypted with aes-256/gpg on a usb drive with a hidden veracrypt volume that also have a decoy encrypted veracrypt volume is essentially uncrackable even by state actors unless you give up the passphrases or use some dumbass passphrases that are easily guessed.
This is the kind of shit where if you have critical evidence on the drive they’ll hold you: there was a police sergeant in Philly who (probably) had child porn on his macbook. They couldn’t prove it becuase his drive was encrypted and he refused to give up the passphrase. He was held for four years on contempt charges and they finally gave up. He wasn’t even using an esoteric approach, he just had macos filevault turned on
The approach I described sidesteps that issue because it creates a decoy encrypted veracrypt for them to find and for you to give up. The hidden veracrypt with your salacious details is a volume that is created within the free space of the outer volume so it essentially undetectable unless you give it up and by design you give up the outer volume that shows innocuous data. Of course, having veracrypt at all invites suspicion of a secret volume but this puts you in the above spot: catching a few years with no real charges for refusing to give yourself up. Much better spot than catching charges for whatever crime (or being executed for political activism/journalism/etc)
Meanwhile this guys journals were immediately found and well documented for his federal complaint. You could just burn them I guess but then you no longer have all your data