@neil if I have a USB stick with some encrypted data on it and the police raid my house and take it as part of some investigation they are doing, does the police then have means to force me to tell them the encryption passphrase? If so, what punishment would they threaten me with if I refuse?
@Dragon yes, both cases are interesting I think: the case where I claim that I have forgotten the passphrase, and the case where I clearly still know it (perhaps they have cloned the encrypted data and they can see that I am still able to decrypt my own copy of it, or something like that) but I refuse to give them the passphrase. @neil
@8tpercent @eliasr @Dragon @neil is this like some old software I used a few decades ago where you have a password that decrypted the file but just some plain looking files in there, not your actual data you want seen?
@8tpercent @neil @Dragon @eliasr that’s it! And suddenly it was advised to stop using, I guess due to it being cracked or back doored or something like that?
@staustellsimon @neil @Dragon @eliasr yes, it was thought there was either a backdoor or were being forced to putting one in there. Veracrypt has had an audit (2016-ish) and source available.
There are password crackers for both containers but are slow..
@neil @8tpercent @eliasr @Dragon I think I still have a file that I used with it but I would genuinely not know the password anymore
> I would genuinely not know the password anymore
In the eyes of the UK law, you do still know the password, and you will hand it over to police or they will put you in prison for 5 years.
The Regulation of Investigatory Powers Act 2000 says that if you knew the password "at any time before the time of the giving of the section 49 notice", then you know it "at all subsequent times".
😕 🙃 😖
@eliasr @neil @8tpercent @Dragon worrying isn’t it 😔
@eliasr @Dragon @neil
3 words... veracrypt plausible deniability 🫡