Replies: 3 comments
-
Definitely an interesting idea. But in what way generate meaningful decoy items? |
Beta Was this translation helpful? Give feedback.
-
We actually could resize (extend) decoy partition volume and filesystem on-the-fly to make external and internal size of tomb matching :) And decoy itself may be a compressed volume on top of that. Decoys are better be manually picked and prepared beforehand. Because they must have a feeling of being "personally sensitive" -- enough to justify placing into tomb -- and still exposure of which would be "recoverable". Such that this "oversecurity" leaved people in the bewilderment and laughing over the geek you are. Like keeping some insignificant work-related documents and passwords to useless sites inside of tomb -- which will always can be justified as reasonable and done by you only for the fun. The only issue -- we must randomly update dates on decoy files to simulate recent activity. |
Beta Was this translation helpful? Give feedback.
-
Back on this topic, I have been pondering where to store the emergency password activating the decoy, since that should be undetectable... tricky. I now see that the steganography tool This feature then may be best activated using such steganography, which BTW we haven't yet implemented. Other details on decoy management still need thinkering... making it up to date with recent file access could be automated.... |
Beta Was this translation helpful? Give feedback.
-
There are situations in which one may be coerced to give up the password, with a fine or imprisonment or even torture. We can address this in Tomb v3 with a new feature, hereby proposed.
An additional 'emergency' password may be given: when used to open the tomb will silently wipe all contents and eventually place decoy contents inside to not raise suspicion. This should happen without leaving a trace of the operation. Of course those adopting this feature are supposed to have backups of the Tomb in another place.
I'm interested in discussing this feature while designing the upcoming Tomb major version which will rely on Zenroom rather than GnuPG for key encryption, hence offering more advanced logics of interaction with passwords and keys as well advanced crypto as zero-knowledge proofs (zk-SNARKS).
Comments welcome.
Beta Was this translation helpful? Give feedback.
All reactions