[145990] in cryptography@c2.net mail archive
Re: English 19-year-old jailed for refusal to disclose decryption
daemon@ATHENA.MIT.EDU (Marsh Ray)
Thu Oct 7 20:49:24 2010
X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/mailhop/outbound_abuse.html for abuse reporting information)
Date: Thu, 07 Oct 2010 19:35:42 -0500
From: Marsh Ray <marsh@extendedsubset.com>
To: Bernie Cosell <bernie@fantasyfarm.com>
CC: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <4CADC6B4.24467.D87C70D@bernie.fantasyfarm.com>
On 10/07/2010 12:10 PM, Bernie Cosell wrote:
>
> There's no way to tell if you used the
> first password that you didn't decrypt everything.
Is there a way to prove that you did?
If yes, your jailers may say "We know you have more self-incriminating
evidence there. Your imprisonment will continue until you prove that
you've given us everything."
If no, your jailers may say "We know you have more self-incriminating
evidence there. Your imprisonment will continue until you prove that
you've given us everything."
Get it?
> So in theory you
> could hide the nasty stuff behind the second passsword, a ton of innocent
> stuff behind the first password and just give them the first password
> when asked.
If the encrypted file is large, and disk file fragmentation patterns,
timestamps, etc. suggest it has grown through reallocation, the 4 KB
grocery list you decrypt out of it is not going to convince anyone.
On the other hand, if you produce a sufficient amount of relatively
incompressable image, video, or encrypted data from it, you may be able
to convince them that you've decrypted it all.
- Marsh
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com