diff --git a/opsec/deniability/index.html b/opsec/deniability/index.html index 4ebb27c..3212642 100644 --- a/opsec/deniability/index.html +++ b/opsec/deniability/index.html @@ -121,6 +121,33 @@ The door is closed, the conversation remains between Alice and Bob, their conver
One common arguement that is being brought up is "what if i destroy the data before the adversary can see it?" lets see the following scenario:
+
+-You started doing sensitive actions on your graphene OS phone
+-Somewhere you slipped up, and now the adversary is busting down your door and holding you at gunpoint, handcuffing you and taking you to the nearest station.
+-Now the adversary is telling you "by order of the judge, you are now going to unlock that phone."
+
+-But, you've got your ace up your sleeve, you configured a duress password on your graphene OS phone, meaning that once you type that special password, the contents of your phone are irreversibly deleted, with no possible recovery.
+
+-You type the password, and the phone contents are getting deleted, right in front of the adversary. What now ?
+
+
+Now you are in a situation where the adversary knows that you intentionally destroyed the contents of your phone, he knows that you do not intend to cooperate, and that on top of it you destroyed potential evidence. Where do you think that get you in court ?
+If you were just pretending to have forgotten your password, you'd be found to be in Contempt of Court (approx 6 months jailtime), But here from the point of view of the adversary, he's perceiving it as you knowingly and intentionally tampering with evidence which is way worse, as the sentences for that can go up to 20 years in prison.
+So in short, you need it to look like you are cooperating with the adversary, you must be able to give him a password, and when he unlocks the encrypted volume, he must find nothing incriminating about you, which is why we need deniable encryption.
+ +From a legal standpoint, the only way to be protected against that scenario where you're forced to decrypt your harddrive is to be able to deny the existence of said encrypted volume (Plausible Deniability) . If the encrypted volume does not exist, there is no password to be given for it.
So here we need a technology that can provide us Plausible Deniability. That is what Veracrypt can do for us.
@@ -135,7 +162,7 @@ The door is closed, the conversation remains between Alice and Bob, their conver🧅 Serverside - Plausible Deniability at Home (⚠️ Self Hosting = Risky!)
In this tutorial we're going to take a look at how to setup OpnSense in a VM, in order to have the ability to do a dual-wan setup, while maintaining the FOSS requirement (which pfsense cannot provide).
+ +First let's create an isolated LAN network virt-manager:
+Then, let's download the latest Opnsense iso:
+ + +
+nihilist@mainpc:/run/media/nihilist/VAULT/Isos$ bzip2 -d OPNsense-24.7-dvd-amd64.iso.bz2
+nihilist@mainpc:/run/media/nihilist/VAULT/Isos$ file OPNsense-24.7-dvd-amd64.iso
+OPNsense-24.7-dvd-amd64.iso: ISO 9660 CD-ROM filesystem data 'OPNSENSE_INSTALL' (bootable)
+
+
+
+Next, we create the VM itself by using the iso we just downloaded:
+Now before starting the VM, we make sure that it has 2 network adapters, one being the WAN, and the other being the LAN. (take note of the mac addresses of either network interface, as we'll need to identify which one is which.)
+Then we begin installing the VM as follows:
+And then, we make sure the opnsense router VM acts as a DHCP server for the LAN:
+After that, we put a debian VM in the LAN to test if the network configuration works as intended:
+Here we see that we can access the router VM from the LAN just fine, so we're good!
+Here we currently have the router VM using the
+ + + + +
+
+
+
+
+
+
+
+
+
+
+
+ RSS Feed
SimpleX Chat
+
+
Donate XMR: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
Contact: nihilist@contact.nowhere.moe (PGP)
+