Upload files to "assets/robert.png" #2

Merged
nihilist merged 5 commits from Robert/blog-contributions:main into main 2024-08-07 19:42:25 +02:00
Contributor
No description provided.
Robert added 1 commit 2024-08-06 20:02:06 +02:00
Robert added 1 commit 2024-08-06 20:11:27 +02:00
Robert added 1 commit 2024-08-06 20:12:07 +02:00
Owner
  1. don't involve anything serverside in the situation, we're only talking clientside here.
  2. explain the situation as of when charlie is using a remote service (anonymously right) to do something sensitive, and explain what can go wrong and the consequences (tor 0day, he deanonymizes himself at some point by his actions, etc)
  3. which leads to an adversary to bust down his door and force him to unlock his computer: Can he deny that he is the user that the adversary is seeking or not ?
  4. and yes conclude that without deniable encryption, he can't deny the existance of the encrypted volume, and its contents.
  5. add graphs to illustrate (you can reuse some of the graphs i made if you want)
1) don't involve anything serverside in the situation, we're only talking clientside here. 2) explain the situation as of when charlie is using a remote service (anonymously right) to do something sensitive, and explain what can go wrong and the consequences (tor 0day, he deanonymizes himself at some point by his actions, etc) 3) which leads to an adversary to bust down his door and force him to unlock his computer: Can he deny that he is the user that the adversary is seeking or not ? 4) and yes conclude that without deniable encryption, he can't deny the existance of the encrypted volume, and its contents. 5) add graphs to illustrate (you can reuse some of the graphs i made if you want)
Robert added 1 commit 2024-08-07 09:54:27 +02:00
Author
Contributor

I updated it, please take a look

I updated it, please take a look
Author
Contributor

By the way, the JS was already present in the 0_anon index.html file

By the way, the JS was already present in the 0_anon index.html file
Owner

well, in this case it's questionable wether or not he can deny any implication with the leak, if he really is the only one to have used that password. this can easily be used against him to put him in jail. So i think we need something lighter here.

maybe add another example where LE is literally trying to do some guess work. (ex: they have a batch of 10 potential users that may be the authors of the leak, but they dont know which one. And they persecute Charlie (without any solid evidence unlike the previous idea) and for instance there he can't deny being the author of the leak, as he's forced to type his password (he didnt implement any deniable encryption)

well, in this case it's questionable wether or not he can deny any implication with the leak, if he really is the only one to have used that password. this can easily be used against him to put him in jail. So i think we need something lighter here. maybe add another example where LE is literally trying to do some guess work. (ex: they have a batch of 10 potential users that may be the authors of the leak, but they dont know which one. And they persecute Charlie (without any solid evidence unlike the previous idea) and for instance there he can't deny being the author of the leak, as he's forced to type his password (he didnt implement any deniable encryption)
Robert added 1 commit 2024-08-07 10:54:43 +02:00
Author
Contributor

Edited accordingly

Edited accordingly
nihilist merged commit b7844a2030 into main 2024-08-07 19:42:25 +02:00
Sign in to join this conversation.
No reviewers
No Label
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: nihilist/blog-contributions#2
No description provided.