Skip to content

[submission] Basis (pl Bases) #12

@imuli

Description

@imuli

Obviously this is a work in progress, and I am particularly not sure about the name Basis because the plural invites confusion with Base. This also may be more privacy-oriented than decentralization oriented, so maybe it's out of scope?

The Design Problem

You need to protect information from a physical search where the user may be under pressure to unlock / give up passwords - e.g. at a border checkpoint or in an abusive relationship.

The Design Solution

Provide multiple independent encrypted storage areas that, without the encryption key, appear to be free space or cached data that the user reasonably wouldn't have the means to decrypt. The user can then selectively reveal passwords that expose less sensitive information, without the intruder being able to tell whether there are more passwords.

Examples

Why Choose ... ?

Best Practice: How to Implement ...

Potential Problems with ...

  • The software must be useful independently of its privacy features to avoid suspicion under some threat models. And ideally the more common and widespread the better, even if most people don't use multiple bases.
  • Under extreme scenarios, the intruder does not know when to stop applying pressure.
  • The surrounding environment may contain references that imply the existence of a particular basis, even if implementation is perfect.

The Take Away

References & Where to Learn More

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    Status

    Proposed

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions