2731
					Security / Re: Has anyone ever been caught/convicted for BUYING off silkroad?
« on: May 30, 2012, 03:58 pm »You'd need a customised version of the program to do that.
V.What you want to do is TrueCrypt a small partition, which you install your 'naughty' operating system on, and then produce two keys. One key loads the partition normally for you, the other key loads a clean operating system and wipes the naughty one (3 pass eraze) which you can give to the police during interrogation. By the time they realize what's happened it's too late. You've not broken any laws, you've given them a legit key, and they have no evidence. BINGO
Woah woah woah... there are keys that will start to wipe a hidden volume? With truecrypt? Is that built in or some custom shit?
It would be a waste of a custom program too, considering the first thing forensics people do with data storage devices is make perfect copies of their contents
 
			 
		 Show Posts
Show Posts
			
 . But in theory it could take a year to bruteforce the password "a", it would just take you a year to be able to use it yourself as well
. But in theory it could take a year to bruteforce the password "a", it would just take you a year to be able to use it yourself as well  . Of course if your password is b and they start at a it will take them two years to brute force it and you can use it once every year !!
. Of course if your password is b and they start at a it will take them two years to brute force it and you can use it once every year !!