Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upDeniable encryption #2402
Comments
andrewdavidwong
added
enhancement
help wanted
C: core
crypto
security
labels
Oct 27, 2016
andrewdavidwong
added this to the Far in the future milestone
Oct 27, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
quber
Oct 31, 2016
Deniable encryption come with social danger and must not be include before serious thinking and discuss and community approve first.
I will cough up my passphrase at the mere suggestion of torture. I would probably give up my passphrase if a scary person were to just ask nicely for it.
If Qubes were to incorporate any deniability features, I (and anybody who dislikes being tortured) would require a means to show absolutely that such features were not enabled. These are dangerous features because the moment they are incorporated we would all be using them, whether we are or not.
https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
Read link before even thinking to work on this.
quber
commented
Oct 31, 2016
|
Deniable encryption come with social danger and must not be include before serious thinking and discuss and community approve first.
Read link before even thinking to work on this. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
GustavMarwin
May 24, 2018
As far as I'm concerned, I'll take my chances and vote for having plausible deniability on Qubes-OS.
To reply to quber: Say I simply work on something sensitive / valuable (knowledge) and I'm not under suspicion of anything. A way to login to Qubes-OS without having the "attacker" know about my "normal" work session would be very useful, no negative side effect.
Also maybe a better example, look at the trend at the border control where they ask to see "inside" every electronic you have. In that case again, should someone be asked to open their laptop there's nothing to lose at having a way to login to an "under duress session".
GustavMarwin
commented
May 24, 2018
|
As far as I'm concerned, I'll take my chances and vote for having plausible deniability on Qubes-OS. To reply to quber: Say I simply work on something sensitive / valuable (knowledge) and I'm not under suspicion of anything. A way to login to Qubes-OS without having the "attacker" know about my "normal" work session would be very useful, no negative side effect. Also maybe a better example, look at the trend at the border control where they ask to see "inside" every electronic you have. In that case again, should someone be asked to open their laptop there's nothing to lose at having a way to login to an "under duress session". |
andrewdavidwong commentedOct 27, 2016
On 2016-10-26 16:19, tonyinfinity@tutanota.com wrote: