Quote from: kmfkewm on October 10, 2012, 04:49 pmIn the USA it doesn't matter if you have lost your passphrase or not, probably. You can just plead the fifth. There have been a few CP cases thrown out by the judge because all the prosecution had was an IP address. The accused refuse to decrypt their drive, the government experts have to admit that an IP address is not solid proof, the judge throws the case out.If everybody did FDE it'd be no big deal. But almost nobody does. So using FDE is always suspect. Remember how you were saying intelligence info != evidence? ;)To my mind it is preferable that you have no physical footprint whatsoever. No usb keys, no portable media. It may be possible just to have a thin client setup so there is no local storage at all. You have your computer (like the Pi) magnetically attached to a drainpipe across the city half way up some skyscaper, and you login to that remotely. I'm pretty sure this is possible. So, you can do this with the regular net, where you have rented space on machine in some server farm across the globe in another jurisdiction. The practical problem there is almost nobody has enough bandwidth to do that without serious frustration unless you're from Japan or South Korea or similar. So, if you have some specialized network hardware capable of delivering > 50 - 100 Mbps from A to B for a range of several kilometers, then this is an ideal way to make busting you extremely complicated. They can have your password, no problem. But they only have a dumb terminal, no data unless they've tapped your station. Actually best of all, you'd have all your "real" hardware lying about for them to investigate, none of which you use for SR related business.Now I'm sure there's holes in such an idea, but the principal seems sound. Thoughts?