Hidden Volumes

https://veracrypt.eu/en/Hidden%20Volume.html
Is this stuff actually glowie-proof?

Beware Cat Shirt $21.68

Rise, Grind, Banana Find Shirt $21.68

Beware Cat Shirt $21.68

  1. 1 month ago
    Anonymous

    xkcd_wrench.png

    • 1 month ago
      Anonymous

      That's the point right. Give them the fake password.

      • 1 month ago
        Anonymous

        Yeah this. You give them the fake password, they see your porn and leave. They can keep beating you but they wouldn't be able to tell if they have a reason to do so.

        • 1 month ago
          Anonymous

          The meta now is that you have to have a hidden volume if you have any veracrypt volumes at all, because they have no reason to believe that the password you gave up was the only/real password. no hidden volume? have fun being beaten to death
          if you actually have something to hide you have to find another way to hide it

    • 1 month ago
      Anonymous

      more likely you sit in jail in contempt of court, in most countries. I think in the US the 5th amendment protects against this because you can't be compelled to incriminate yourself.

      • 1 month ago
        Anonymous

        it works, but it's not very practical. it's possible to overwrite hidden volume by writing too much data to outer volume. in general, once you create a hidden volume, you shouldn't write anything to outer volume.

        >more likely you sit in jail in contempt of court
        that's the point. you comply and give them password to outer volume. there is no way to prove hidden volume exists.

        They'll just assume you're lying if you claim there isn't one

        actual brainlet

        • 1 month ago
          Anonymous

          >once you create a hidden volume, you shouldn't write anything to outer volume
          Pretty reasonable tbh. Just fill the outer volume with normie shit or disinformation.
          Why is not practical?

          • 1 month ago
            Anonymous

            well, there's always risk that some app will start caching or writing some temporary stuff to outer volume, destroying secret data. it's all kinda sketchy. you really need to be careful with that, and be 100% sure you know what you're doing. other than that, hidden volumes are pretty cool.

          • 1 month ago
            Anonymous

            https://i.imgur.com/GXu5sHq.gif

            https://veracrypt.eu/en/Hidden%20Volume.html
            Is this stuff actually glowie-proof?

            Centralized thumbnail cache The cache is stored at %userprofile%AppDataLocalMicrosoftWindowsExplorer as a number of files with the label thumbcache_xxx. db (numbered by size); as well as an index used to find thumbnails in each sized database.

            Anons you done goofed.

          • 1 month ago
            Anonymous

            >he doesn't disable thumbnails

          • 1 month ago
            Anonymous

            >privacy schizo thread
            >talking about windows

          • 1 month ago
            Anonymous

            You're honestly telling me you would use veracrypt instead of dm-crypt on Linux.

        • 1 month ago
          Anonymous

          well, there's always risk that some app will start caching or writing some temporary stuff to outer volume, destroying secret data. it's all kinda sketchy. you really need to be careful with that, and be 100% sure you know what you're doing. other than that, hidden volumes are pretty cool.

          You can open your outer volume in a way that allows you to write a limited amount of data (you set the ratio during setup) and can't overwrite any of the actual data in the hidden volume.
          At least that's what TrueCrypt worked. Don't know if VC changed it.

          • 1 month ago
            Anonymous

            oh, cool. didn't know that. thanks anon.

      • 1 month ago
        Anonymous

        >I think in the US the 5th amendment protects against this because you can't be compelled to incriminate yourself
        False
        You may get charged with terrorism charges (dont forget blaming the government counts as such) so you lose all your rights including having a lawyer

      • 1 month ago
        Anonymous

        Republicucks significantly weakened 5th amendment protections via Salinas v Texas. You can also be held indefinitely if you're found in contempt of court. Look up the case of Tommy Thompson. He's been in prison for nearly nine years for refusing to co-operate with law enforcement, and will likely never be released unless he agrees to do so.

    • 1 month ago
      Anonymous

      fricking idiot, kys

    • 1 month ago
      Anonymous

      This. The moment the glowBlack folk are after you the best thing you can do is to destroy the disk.

  2. 1 month ago
    Anonymous

    yes, under the right circumstances. If your computer is seized while it's turned off and you have not had your password compromised through some other means, they won't be able to decrypt it.

  3. 1 month ago
    Anonymous

    nothing is glowieprooftvt

    • 1 month ago
      Anonymous

      >github Brendan-Kirtlan/Minecraft-file-encoder
      i'd love to see a glowie figure that one out

      • 1 month ago
        Anonymous

        What do the maps look like? Are they plausible as regular maps or are they just a bunch of random-looking blocks from the lower to the upper limit?

        • 1 month ago
          Anonymous

          they blocks are just insterted into regular maps. if you keep files small you can put them inside a castle wall or wherever if you really want to hide it. though you can just have them a bit of from spawn i doubt glowies would go check your minecraft worlds

          • 1 month ago
            Anonymous

            Interesting, thank you.

          • 1 month ago
            Anonymous

            how much CP is hidden in minecraft?
            I wonder if any pedos have hidden CP of a kid they met through minecraft, in minecraft

  4. 1 month ago
    Anonymous

    OP-here. I'm talking about hidden volumes and giving the fake password if I am pressured to. Is there anyway they can find out the existence of the hidden volume?

    • 1 month ago
      Anonymous

      >Is there anyway they can find out the existence of the hidden volume?
      No

      xkcd_wrench.png

      Brainlet

    • 1 month ago
      Anonymous

      They'll just assume you're lying if you claim there isn't one

      • 1 month ago
        Anonymous

        I think you can have multiple hidden volumes. So they'll never be able to find out the truth.

        • 1 month ago
          Anonymous

          Does the truth matter?
          Let's run through some of the people who might be coming for you
          >criminals
          They don't care for evidence and will kill or torture you regardless
          >NSA
          if the data came from another computer to yours then they already have it all
          >FBI
          they won't go through your computer without prior evidence regardless so you're fricked anyways
          >CIA
          they'll torture you for decades before dumping your ass in an empty desert even if they know their evidence is either wrong or non-existant
          >local police
          It's likely personal anyways so they'll just frame you for a different crime if they can't find any real evidence
          What exact scenario do you think this stuff's gonna protect you from?

          • 1 month ago
            Anonymous

            I'm on vacation in a foreign country and get held by their government, and mine appeals for my release.

          • 1 month ago
            Anonymous

            >t, picrel
            All of the situations you described will become 10x worse if they have access to the actual data.

          • 1 month ago
            Anonymous

            Depends what you mean by worse; in most cases the torture stops when you give out the second password, and that's usually an improvement.

          • 1 month ago
            Anonymous

            Is it just delusions of grandiosity or why do you people always jump into these absurd scenarios? What about customs seizures under repressive governments? Its not unheard of for journalists to be targeted at airports, but its not going to result in being abducted and tortured. Most uses for encryption are mundane, like theft protection, not because you're some criminal mastermind or a threat to secret services.

          • 1 month ago
            Anonymous

            >not unheard of for journalists to be targeted at airports, but its not going to result in being abducted and tortured
            laughing_kashoggi.png

      • 1 month ago
        Anonymous

        That's not a good assumption because many people like me use full disk encryption without a hidden partition. If I unlock my drive and they don't find what they're looking for, there's really nothing else to show. The extra space is really just unused.

      • 1 month ago
        Anonymous

        Another brainlet take. Imagine getting raided for nothing and the police being like 'We know you have hidden volumes!'

    • 1 month ago
      Anonymous

      No, they can't prove it's encrypted data. It's not unusual to wipe a drive by overwriting it with random data which could explain why the "free space" is not all zeroes or deallocated files. There is a reasonable alternative explanation to it being encrypted partition.

      • 1 month ago
        Anonymous

        Reasonable doesn't mean believable.
        If he's being investigated in the first place, there's a good chance that they already have at least a strong suspicion that he's hiding something (possibly the thing they're trying to find by decrypting his drive), and they're not going to accept at face value that that space that looks exactly like the perfect place to hide that thing is just the other innocent thing that it might also be.
        They're going to think you're hiding something and demand the second password as well, effectively putting you in the same position you'd be in if you just encrypted it normally.

        • 1 month ago
          Anonymous

          >encrypts drive
          >makes a hidden volume
          >inside that hidden volume makes another hidden volume
          >inside that hidden volume makes another hidden volume
          >inside that hidden volume makes another hidden volume
          >...
          at which point court will believe there are no more nested hidden volumes?

          • 1 month ago
            Devil's Advocate

            >28 hidden volumes
            >only 2mb left for actual use
            >hides a single e-girl

          • 1 month ago
            Anonymous

            >we've already opened 3 nested volumes, showing that the suspect both knows about and is a user of the hidden volume feature
            >there's still empty space that we have "reasonable suspicion" of being where he's hiding the data that we think he has
            >welp, I guess it really is empty space and everything that led us to investigate him was wrong
            They're obviously going to continue pressing you until they find what they want or you somehow prove that you're innocent (innocent until proven guilty doesn't apply if there's "reasonable suspicion").

          • 1 month ago
            Anonymous

            >innocent until proven guilty doesn't apply if there's "reasonable suspicion"
            oh ok, so you actually don't know what you're talking about. been nice taking to you anon.

          • 1 month ago
            Anonymous

            If the police is investigating you they can just say you're hiding something and continue holding you for the investigation.
            The exact same way as when you only give them the decoy password and they think you have a hidden partition.

          • 1 month ago
            Anonymous

            >If the police is investigating you they can just say you're hiding something and continue holding you for the investigation.
            this is an entirely different problem. if you show up on their radar, and they can hold you indefinitely, you are fricked either way. it's about not giving them evidence against you.

          • 1 month ago
            Anonymous

            You'd rather be held indefinitely on mere suspicions than do time for crimes you've definitely committed?

          • 1 month ago
            Anonymous

            in reality, you won't be held indefinitely. you may even sue for wrongful imprisonment when they let you out. and yeah, depending on the crime it may even be better to get hit with contempt of court than actually get sentenced.

          • 1 month ago
            Devil's Advocate

            >refuse password
            UK: precedent 13 months
            France: 3years, 5years if they have proof it would prevent a crime
            India: 7years
            South Africa: 13years
            I don't even have anything illegal I just don't want to be a cuck.

          • 1 month ago
            Anonymous

            >still not life or a bullet to the head
            again, it may be worth it. there are crimes more serious than keeping a rare pepe folder.

          • 1 month ago
            Anonymous

            That's used primarily so you cave in. You know that they won't give you back the data anyway. So you could go to jail for 13 years in SA and still have to fear that they get you and you get x many years on top of that.

          • 1 month ago
            Anonymous

            I'm not advocating for not encrypting your files, much less the stuff that would get you in trouble.
            I'm just saying that if you look at the kind of situation where you're forced to reveal your password, you shouldn't expect to get away by just giving them the decoy key. Some times they'll let you go, some times they won't. It's not at all reliable (nothing is, really), so even if it's common sense to you and me, it's important to say it for all the people here who believe that if you don't give them definitive evidence you get completely cleared.

            yeah, it's a gamble. still, with hidden volume you can get a certain level of plausible deniability, and it's better than nothing.

          • 1 month ago
            Anonymous

            I know, I just will use FDE and explain it to my lawyer

          • 1 month ago
            Anonymous

            But that's my point. If you're being searched by the police chances are that you are already on their radar. It's much more rare to be searched and asked for a password to a drive without being on their radar, so obviously protecting yourself from the possibility of being investigated makes more sense than just limiting your protection to the lighter threat of going through an airport or something.
            You prepare by never allowing them to find the drives themselves. MicroSDs are pretty spacious nowadays and you can hide them outside of your house (or whatever space they're likely to search) or in other more elaborate ways that dogs can't find. Keep your illegal data on there and you can give them all of your passwords without a care in the world, and if you appear willing to collaborate they'll be much more likely to let you go, as opposed to letting them open the sketchy outer volume that looks like a set up fake partition.

          • 1 month ago
            Anonymous

            >Keep your illegal data on there
            *Not a legal advice

          • 1 month ago
            Anonymous

            What do you mean?

          • 1 month ago
            Anonymous

            welp, agreed. it's always better not to attract attention in the first place, but encryption comes into play when they are actually onto you. like I said, it's a different problem.

          • 1 month ago
            Devil's Advocate

            All of this is common sense and it would already be implemented. Encryption is there to add the final and unbreakable layer of protection.

          • 1 month ago
            Anonymous

            I'm not advocating for not encrypting your files, much less the stuff that would get you in trouble.
            I'm just saying that if you look at the kind of situation where you're forced to reveal your password, you shouldn't expect to get away by just giving them the decoy key. Some times they'll let you go, some times they won't. It's not at all reliable (nothing is, really), so even if it's common sense to you and me, it's important to say it for all the people here who believe that if you don't give them definitive evidence you get completely cleared.

          • 1 month ago
            Anonymous

            make 3 nested hidden volumes
            call them nested hidden volume 0, 1 and 3.
            they will spend ages looking for nested volume 2.

      • 1 month ago
        Anonymous

        >It's not unusual to wipe a drive by overwriting it with random data
        It's actually very unusual, 00s work faster. Well, it was until modern cryptsetup with dm-integrity that wipes the whole disk for checksumming, but that's kind of an offtopic for Veracrypt. Now I wonder if it actually urandoms the unused space.

        • 1 month ago
          Anonymous

          >It's actually very unusual, 00s work faster.
          DBAN has been a recommendation forever if you actually want to go the extra mile. I would say the unusual bit would be drives being nuked at all before being thrown in the bin.

      • 1 month ago
        Anonymous

        Not entirely accurate; it's full disk encryption, the free space IS encrypted data. They can't tell if it's encrypted zeros or encrypted data though.

      • 1 month ago
        Anonymous

        wrong of course nobody wipes with random numbers only ever 0 and perhaps 1 also
        it would look a lot less suspicious if the encrypted hidden partition showed up on the disk as all 0s

    • 1 month ago
      Anonymous

      Assuming verashit works the same way as LUKS - only if they get hand on header files.

      • 1 month ago
        Anonymous

        You can't open LUKS just from the header files. But the existence of luks header files destroys your plausible deniability. LUKS has a way to separate header files.
        VeraCrypt claims to have plausible deniability by default.

    • 1 month ago
      Anonymous

      Step 1 : Create an enterprise
      Step 2 : Buy a compooter through that enterprise
      Step 3 : Crypt that computer hard drive
      Step 4: File for bankrupty
      The glowie cannot request the hardrive password to anyone because the enterprise owning it does not exist anymore.
      Congrats, you have gamed the system.

    • 1 month ago
      Anonymous

      Windows logs all drives that were mounted and the files stored in it with thumbnails, path, etc. Your hidden partition counts as mounted drive. Veracrypt is secure but Windows isn‘t at all.
      Linux might do the same as „comfort/logging feature“, don‘t know. You can use full-drive encryption on the drivewhere your OS is stored on but I don‘ttrust it, it‘s not nearly as solid as encrypting data drives. A live OS (where everything is stored in RAM) is the only solution in this case.

      • 1 month ago
        Anonymous

        What would you need to have to go to such lengths as ordinary person?

      • 1 month ago
        Anonymous

        >delete .cache
        >delete systemd-jorunal logs
        what now

        • 1 month ago
          Anonymous

          Wrench -> undelete

          • 1 month ago
            Anonymous

            mount -t tmpfs /var

          • 1 month ago
            Anonymous

            not nice

    • 1 month ago
      Anonymous

      Depends. Are you using a secured environment when researching and asking this stuff? Otherwise it's already over kek

  5. 1 month ago
    Devil's Advocate

    The data in the header of the standard volume indicates where the outer volume starts.
    If a party reads the header and sees that there is a gap between where the header ends and where the outer volume starts, they can imply the existence of a second header file (shown in blue in OP picrel), thereby knowing there is a hidden volume.
    Please respond anons.

  6. 1 month ago
    Anonymous

    >"well there's nothing but a bone-stock Windows install on this 512GB drive with one 50GB partition, he must be innocent"
    that'll work

    • 1 month ago
      Anonymous

      You're not wrong overall, but if he uses full-disk encryption, opening the outer volume would show a partition as big as the entire drive, marking the space currently occupied by the data in the hidden partition as empty (and overwritable).
      It will only show the smaller size if you do this

      [...]
      You can open your outer volume in a way that allows you to write a limited amount of data (you set the ratio during setup) and can't overwrite any of the actual data in the hidden volume.
      At least that's what TrueCrypt worked. Don't know if VC changed it.

  7. 1 month ago
    Anonymous

    Theoretically yes, but if they find in your browser history a lot of mentions of "how to make Hidden Paritions" or "is it easy to hide Hidden Partition from glowies" and your hard drive has a huge empty space for some reason, they might reasonably assume you're hiding something from them.

    • 1 month ago
      Anonymous

      Any good lawyer will quickly show that this tech autist (remember where we are) was just interested in how it works and that there's no proof that he used it.

    • 1 month ago
      Devil's Advocate

      Damn I fricked up big time making this thread.

      • 1 month ago
        Anonymous

        >Anon we know there is a hidden volume
        >You were literally asking about it in a Mongolian basket weaving forum
        >I'm afraid we will have to keep tickling you.

  8. 1 month ago
    Anonymous

    It is, technically.
    > 400GB image
    > 200GB of stuff, 200GB of free space with high entropy
    > appears as 400GB of encrypted stuff
    > 400GB of stuff
    > will look different yet there's no recognizable pattern
    So you see, if they take copies of your image every week, compare them, then record where changes have occurred, it may raise questions. On one copy, it's impossible to tell.
    Also choose modern crypto. Say, with CBC they may be able to plan evidence without knowing the key. It's a long shot, rather impractical, but just avoid CBC.

  9. 1 month ago
    Anonymous

    Can't there be such an encryption algorithm that allows two volumes to literally exist on top of each other? Why can't you just make it that way mathbros?

    • 1 month ago
      Anonymous

      technically possible but not that easy to implement. You could use the existing data and point to chunks to recreate your second layer. Let's say your underlying data is 01011001 and the data you want to save is 101 then you could point to the second bit from the left with a size of 3. The problem however is that as soon as your underlying data changes you have to change your second layer

  10. 1 month ago
    Anonymous

    I just made myself a portable operating system on an ssd on the advice of https://desuarchive.org/g/thread/98082998/.
    I used LUKS. Am I about to be waterboarded?

    • 1 month ago
      Anonymous

      yes, prepare to get roided by the EPA

  11. 1 month ago
    Anonymous

    isn't it kind of a tell tell to leave space between the volume header & file data?
    I feel like it would actually be more hidden if you hid the hidden volume header info in the standard volume just obscured in some way.

    • 1 month ago
      Anonymous

      >isn't it kind of a tell tell to leave space between the volume header & file data?
      no. it's always there, and filled with seemingly random data, no matter whether hidden volume exists or not. it tells nothing.

      • 1 month ago
        Anonymous

        oh ok
        but isn't it still a tell tell to not have partitioned the entire full drive? Like if a forensics guy looks at your file system and sees you've left half the drive space unpartitioned wouldn't that make him think you probably have a hidden drive in the unpartitioned part?

        Shouldn't a better hidden drive somehow be hidden inside the partition space? But of course then you run the risk of files getting overridden. Maybe you can do something to prevent that tho

        • 1 month ago
          Anonymous

          >Shouldn't a better hidden drive somehow be hidden inside the partition space?
          that's exactly how hidden volumes work
          >But of course then you run the risk of files getting overridden. Maybe you can do something to prevent that tho
          see

          [...]
          You can open your outer volume in a way that allows you to write a limited amount of data (you set the ratio during setup) and can't overwrite any of the actual data in the hidden volume.
          At least that's what TrueCrypt worked. Don't know if VC changed it.

          oh, cool. didn't know that. thanks anon.

  12. 1 month ago
    Anonymous

    aint clicking that link, glowie.
    we know its a honeypot to track your ip.

    • 1 month ago
      Anonymous

      >veracrypt official website
      >open source
      >thinks link is a honeypot
      Don't worry, nobody's after you, you're too dumb to do any damage.

  13. 1 month ago
    Anonymous

    Rubber hose'd.

  14. 1 month ago
    Anonymous

    Oh wowee imagine if there were ways to have a chip boot before the CPU and capture all those juicy codes from memory. Imagine!

  15. 1 month ago
    Anonymous

    >anon makes a thread about hidden volumes
    >glowies flood thread with fud and room temp takes

  16. 1 month ago
    Anonymous

    Thanks. Doc

  17. 1 month ago
    Anonymous

    You fellas sure do have a lot of "illegal data" huh

    • 1 month ago
      Anonymous

      Gore (animal and human)
      e-girls
      Ai Waifu
      BDSM
      Horror Porn
      IQfy
      Misogyny
      Incel stuff
      Normal coombait
      Ragebait
      Nothing illegal. Just frowned upon. I wouldn't want anyone to find out what's in my drive.

  18. 1 month ago
    Anonymous

    Just use a quantum proof encryption method during creation time with a good password length of 20 chars or more and you're good to go without having to deal with hidden container shenanigans

    • 1 month ago
      Anonymous

      >use a quantum proof encryption method
      Such as?

      • 1 month ago
        Anonymous

        AES

        Just use a quantum proof encryption method during creation time with a good password length of 20 chars or more and you're good to go without having to deal with hidden container shenanigans

        >good to go without having to deal with hidden container shenanigans
        there are some barbaric countries out there where court can order you to hand over the password, e.g. USA. refusal can have nasty consequences

        >refuse password
        UK: precedent 13 months
        France: 3years, 5years if they have proof it would prevent a crime
        India: 7years
        South Africa: 13years
        I don't even have anything illegal I just don't want to be a cuck.

        .

        • 1 month ago
          Anonymous

          >there are some barbaric countries out there where court can order you to hand over the password, e.g. USA. refusal can have nasty consequences
          Tell them your password had to do with taking every second letter of every second page of every book lined up on your bookshelf but now that you guys raided my house and destroyed the bookshelf i have no way of getting the password back.

          • 1 month ago
            Anonymous

            >no books were destroyed during the raid anon
            >what book was that anon? we'll pull all editions and check if true
            you'd better have something up your sleeve, because shit like that doesn't fly in court. you just destroyed your credibility and are open to get raped by prosecution.

        • 1 month ago
          Anonymous

          >e.g. USA
          In the US you can just tell them you forgot the password. They cannot prove mens rea.

          • 1 month ago
            Anonymous

            yep, that's a better tactic than obvious moronation like

            >there are some barbaric countries out there where court can order you to hand over the password, e.g. USA. refusal can have nasty consequences
            Tell them your password had to do with taking every second letter of every second page of every book lined up on your bookshelf but now that you guys raided my house and destroyed the bookshelf i have no way of getting the password back.

            . it's still not 100% bulletproof.

            wrong of course nobody wipes with random numbers only ever 0 and perhaps 1 also
            it would look a lot less suspicious if the encrypted hidden partition showed up on the disk as all 0s

            >nobody wipes with random numbers
            DBAN does that, and it's a pretty common way to nuke drives.
            >it would look a lot less suspicious if the encrypted hidden partition showed up on the disk as all 0s
            it would, but it is irrelevant to this thread.

          • 1 month ago
            Anonymous

            >a pretty common way to nuke drives
            The average person doesn't ever think about nuking drives.
            Yes, there are more legitimate uses for it than illegitimate, but if you're being investigated and they analyze the drive to see that it's filled with randomness, it's going to look suspicious as hell.

          • 1 month ago
            Anonymous

            we're on IQfy, we're not talking your average Mac user. most people around here are at least somewhat tech savvy, and nuking unused drive is basic information hygiene. it is completely plausible that an anon on trial nuked his drive.
            >it's going to look suspicious as hell
            still not hard evidence

          • 1 month ago
            Anonymous

            >we're on IQfy, we're not talking your average Mac user
            Yes Anon, being a IQfyentooman is going to make the police think it's a nuked drive (something that's also not suspicious at all) and not the encrypted drive containing the files they're looking for.

            >still not hard evidence
            See

            I'm not advocating for not encrypting your files, much less the stuff that would get you in trouble.
            I'm just saying that if you look at the kind of situation where you're forced to reveal your password, you shouldn't expect to get away by just giving them the decoy key. Some times they'll let you go, some times they won't. It's not at all reliable (nothing is, really), so even if it's common sense to you and me, it's important to say it for all the people here who believe that if you don't give them definitive evidence you get completely cleared.

          • 1 month ago
            Anonymous

            police can suspect anything. they still need to prove it.
            >See

            I'm not advocating for not encrypting your files, much less the stuff that would get you in trouble.


            I'm just saying that if you look at the kind of situation where you're forced to reveal your password, you shouldn't expect to get away by just giving them the decoy key. Some times they'll let you go, some times they won't. It's not at all reliable (nothing is, really), so even if it's common sense to you and me, it's important to say it for all the people here who believe that if you don't give them definitive evidence you get completely cleared.
            see

            [...]
            yeah, it's a gamble. still, with hidden volume you can get a certain level of plausible deniability, and it's better than nothing.

          • 1 month ago
            Anonymous

            You'll be in huge trouble anyway even if they can't prove anything, because they'll continue to investigate you.

  19. 1 month ago
    Anonymous

    It's fairly unusual to have a considerable amount of unallocated space on a drive.
    That's not evidence of anything, but they won't be riding a case on that fact alone.

    • 1 month ago
      Anonymous

      >considerable amount of unallocated space on a drive
      that's not how hidden volumes work. read the thread.

      • 1 month ago
        Anonymous

        The hidden volumes LOOK like unallocated space.

        • 1 month ago
          Anonymous

          No.

        • 1 month ago
          Anonymous

          Haha, no it doesn't. There are white papers for that topic.

          Overall glowies can beat you to death until they get what they want and nobody will help you. Camera footage will be lost if needed, you will be killed in a cell and it will be because of unknown circumstances and shit. This is how they do stuff in my country. Life is not a tv show where everybody is nice to you and respect your rights.

          • 1 month ago
            Anonymous

            >Life is not a TV show
            >Proceeds to spout classic TV tropes
            Either way, you will be screwed in your scenario but you're at least making it harder for the feds.

  20. 1 month ago
    Anonymous

    Another problem is that you also need to actively use the outer volume because a half-empty encrypted container with data that hasn't been touched since the container was created is very suspicious

    • 1 month ago
      Anonymous

      it could be encrypted backup. you don't touch backup drives too often.

  21. 1 month ago
    Anonymous

    >Is this stuff actually glowie-proof?
    Anon all it takes is a RCE/LocalCE and they see your screen+keylog your shit.
    If glowies are interested in you it's over you might as well communicate to them.

  22. 1 month ago
    Anonymous

    If the encryption is implemented properly and the software is trustworthy then yeah. As long as the NSA doesn't want you you're fine.

  23. 1 month ago
    Anonymous

    Now fr, using vc to fight off NSA/Mossad/Illuminati/whatever is lowkey af since they know that your encrypted volume might have the hidden one inside and you wont be able to proove that you dont have one. Therefore they might want to use physical force to persuade you into giving them access to hidden data that is not even real. In this case you would probably be better with either storing the data in some remote location or implementing a possibility to destroy it completely. Anyway, I encourage you to read the following book to determine if you are a valid target for law enforcement at the first place.
    https://anonymousplanet.org/

  24. 1 month ago
    Anonymous

    If glowies actually want to investigate your files, surely you must consider all your data lost already? They could just put some glowie tracker in your drive that reports as soon as you try to access something hidden. If you're actually doing anything that necessitates this I think you just have to be like Mr robot and throw all your chips in the microwave as soon as you may have been exposed.

  25. 1 month ago
    Anonymous

    if they want your password they will inject you with some scopolamine and you recite it with a smile on your face

  26. 1 month ago
    Anonymous

    Linux on USB
    Disabled page file on windows
    Page file is the hidden partition on Linux using plain dm-crypt (no header)

    Any file could be used or copied and pasted with .Backup added
    https://wiki.archlinux.org/title/Dm-crypt/Encrypting_an_entire_system#Plain_dm-crypt
    https://wiki.archlinux.org/title/NTFS

  27. 1 month ago
    Anonymous

    veracrypt is not against glowies, it's against some random hobo that steals your laptop, finds you "stuff" and rats you to the police or blackmails you
    if glowies take an interest in you they will get your data no matter what, trust me
    unless you NEVER access the data yourself, but then what's the fricking point of keeping them anyway?
    also unless you're doing some really serious things no glowies will ever care about your little stash of pictures or whatever

  28. 1 month ago
    Anonymous

    Maybe just don't store illegal shit on your drives?
    Have you tried that?

Comments are closed.