TrueCrypt decoy os VS emulated OS in encrypted container

Discussion in 'privacy technology' started by TheRussian, May 2, 2013.

Thread Status:
Not open for further replies.
  1. TheRussian

    TheRussian Registered Member

    Joined:
    Apr 19, 2013
    Posts:
    21
    Ok if you are familiar with TrueCrypt it offers dual boot setup in whcih one OS is started if password is correct and another if password is wrong. The whole partition is encrypted so you can't really tell there are 2 OS.
    That's one of the options.

    The another is to have your everyday OS, with fully encrypted partition, and there you have encrypted file container where you have your virtual machine OS.
    You mount the container when needed, emulate the machine and you are good to go.

    Now i would appreciate a discussion where we can dig into the advantages and disadvantages of each setup.
     
  2. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    The purpose of the decoy is to "throw off" an attacker who turns on your computer to inspect it (the most practical example is state sponsored security agencies). Either by giving them the decoy password, or, my preferred method of not even encrypting the decoy. Both systems are completely separate.

    Your VM from a hidden container would also work, but you are taking a risk that the the decoy, host OS, would record something from the VM session...somewhere in the file system. You also have a TC container on the decoy itself. IMO, it's easier to explain away a raw partition, than it is a .tc file that is 10 Gigs, or a huge .iso that doesn't have the correct file headers.

    IMO, the 'decoy' should be as clean as a new car.

    PD
     
  3. redcell

    redcell Registered Member

    Joined:
    Sep 27, 2010
    Posts:
    126

    Based on experience, it is best to fill in the decoy OS with some stereotype contents like porn pictures (make sure they're easy to find on the web) and perhaps some you photoshop to your preference.

    This creates the impression that the "decoy" is indeed the real deal due to the dirty little secrets found. I could still remember the time when my adversary said it was normal for unmarried man like me to possess porn for personal consumption.

    Most importantly, your ultimate defenses are natural pretense and psychological strength - never to give in to false confession under any circumstances.
     
  4. S.B.

    S.B. Registered Member

    Joined:
    Jan 20, 2003
    Posts:
    150
    So exactly what is this "experience"? Not a single fact, not even a single claim is given to support the actual existence of "experience". Without facts or any data whatsoever, the arguments must be evaluated as they are given; namely arguments supported only by conjecture.

    Now onto the substance of the arguments. The substance seems to be this:
    The safest way to hide something from legal authorities is to provide evidence to those same authorities that the person in question has an active interest in, and is currently in possession of, pornography.​

    Sorry but the arguments don't even pass a common sense test. Plainly, pornography will make the person in question more suspicious, not less suspicious. Pornography on a person's computer could support a custom official's decision to deny entry; could support an official's decision to conduct further and extensive searching of the person, their activities, their possessions; etc.

    The arguments actually sound like advice designed to help a person entrap themselves...

    On a positive note, this advice could provide basis for a scene in a comedy movie or play (one brilliant chum offering advice to another brilliant chum. Followed by one or both brilliant chums getting deeper and deeper into trouble with various authorities...)

    __
     
    Last edited: May 6, 2013
  5. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    Having a well used decoy, I agree with. But I prefer web history showing Disney, and pictures of flowers :D

    This may not have flown in 1998, but now a days, with multiple computers in the house, in addition to phones and tablets..."I just don't use it that much" is very plausible.

    PD
     
  6. anniew

    anniew Registered Member

    Joined:
    Mar 15, 2013
    Posts:
    92
    Following that theme, for a border crossing scenario, load it with photos from "recent vacations", Photoshop, etc. and carry a decent camera, maybe a "backup" hdd of those photos, and/or a drop box account you can log into with those / other photos. Depending on your situation, the photos can be personal, or can be found online at Flicker or other such site.
     
  7. happyyarou666

    happyyarou666 Registered Member

    Joined:
    Jan 29, 2012
    Posts:
    802
    or actually use it for IRL stuff like banking , work , emails etc, remember anything thats tied to you in IRL they most likely already know anyhow through all kinds of means depending on "adversary" , so why hide your IRL data , no reason to , makes your plausibility status just worse , use proper 64 key passphrases for your setup, and use the hidden volume for everything and anything thats NOT you , if you catch my drift..or let me spell it out for ya anything that doesnt carry or is tied to your IRL identity ;) , thats the only REAL plausible deniable way ;) , and not porn , jesus ,the worst suggestion ive heard as of yet on how to properly use a "decoy" , if anybody has followed that advice i suggest to do a complete wipe of the drive ,backup the data beforehand and start over again , cause your plausible deniability just went out the window
     
    Last edited: May 14, 2013
  8. anniew

    anniew Registered Member

    Joined:
    Mar 15, 2013
    Posts:
    92
    Very thoughtful...and about the porn, the issue may not just be deniability, but the illegality specific to the country / jurisdiction you are traveling to / through. You multiply your risks with that.
     
Loading...
Thread Status:
Not open for further replies.