• PowerCrazy@lemmy.ml
      link
      fedilink
      English
      arrow-up
      6
      ·
      3 months ago

      They know it exist as a concept. They can’t prove that the specific decrypted message contains a super-secret encrypted message as well.

      • refalo@programming.dev
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        3 months ago
        • they will know you have such program on your computer

        • it is capable of deniable encryption

        • most people use it for this exact reason

        • the file size of the container will not match the size of the contents of your ‘safe’ volume

        I think a reasonable person/court/judge/police/etc. would conclude that you are most likely still hiding something given all that.

        • PowerCrazy@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          3 months ago

          I guess having a thick provisioned VM image on your laptop means that you are hiding something. Again if the evil government you are trying to hide something from doesn’t need reasonableness as a reason to detain you, then who cares? No matter what you do you are rolling the dice every time you interact with them.

          Which is of course similar to the US today, so if I needed to hide something from them I’d make sure that once i’m legally compelled to give my password they at the very least wouldn’t have what they are looking for, since there is no way I could prove I didn’t have it anyway.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        6
        ·
        3 months ago

        The don’t need to. They can just beat it out of you. In the kind of places where they can force you to hand over passwords it doesn’t matter.

        • PowerCrazy@lemmy.ml
          link
          fedilink
          English
          arrow-up
          12
          ·
          edit-2
          3 months ago

          Beat what out of you? You already gave them a password that decrypts a specific file/volume/etc. If they want to beat you, they will beat you regardless of your possession of any encrypted materials.

        • mattreb
          link
          fedilink
          arrow-up
          3
          ·
          3 months ago

          I get what you mean, I think in a realistic scenario this only work to circumvent some laws. if you are tortured by someone who know about this and don’t care about your life, then it’s meaningless.