FDA is a liability. How to hide veracrypt containers?

I have concluded that full disk encryption is a liability and will only get you in trouble if someone manages to access your computer, either through an arbitrary airport check, border, theft, or corrupt politicians enacting laws against your computer. privacy. The point is, we need alternatives. The best I can think of is to store the data you want to hide in a veracrypt container, put it somewhere and access it only through a Tails live session, by mounting the disk containing the container, the container to copy into RAM (in one of the Tails folders), unmount the disk and then access the container, so that all encrypted data remains only on the ram (all this offline, of course) So now the question is: how to prevent you know that the file is found? can you put it in some sort of obscure file format that hides it from some kind of container scanner? for extra protection you could add a hidden volume that, as far as I know, allows for actual plausible denial as opposed to a hidden operating system that you can’t really get away with, but at least you don’t want the container to be found to be used with. to start. I would only need a small container as I only need to hide some spreadsheet files and documents so it shouldn’t be difficult to hide, the problem is how can I hide it from types of forensic scanners?

About Cryptoplatforming.com

Cryptoplatforming.com is a news websites which gets news around the globe on investing in Crypto. Our news has no backgroundcheck.

3 thoughts on “FDA is a liability. How to hide veracrypt containers?”

  1. Yeah, don’t carry it on you. Just encrypt it and put it on the cloud somewhere or a personal server you have physical access to in a secure location.

    Then just work on it on the server. Nothing for anyone to find at a border crossing or steal from your person.

    If your goal was to “hide” encrypted data, you could do that by just being creative. E.g. encoding it into images you have already or any file type really. As long as the file itself doesn’t look unusual nobody would suspect it has data secretly encoded in it, e.g. hiding in the metadata or image data, or encoded into audio data at a certain hz would look like noise.

  2. TPM-enabled FDE is definitely not a liability, it protects the integrity of your boot chain. It’s just not a panacea. Encrypted volumes also aren’t a panacea when you can’t trust the kernel you just booted, so you need both.

    Like most of these conversations, the answer is it depends on your threat model.

    No matter who you are, you definitely shouldn’t carry encrypted media across an international border without being prepared to be stopped and forced to decrypt it for them. If that happens, you should erase the device at a minimum, or more likely just throw it in the trash after its been returned to you.

    Those checks are usually just opportunistic ones by nosey governments – they have you at their mercy and they’re poking through your stuff because they can. Maybe you’ve got brown skin or you “looked nervous”.

    Honestly, the easiest way to bypass those checks is just put your truecrypt volume into cloud storage before you travel and download it when you reach your destination. Take a MAC before and after if you’re truly paranoid.

    If you were only moving a few kilobytes then *maybe* you could create a 1G volume full of (legal) porn and hide your data in a hidden volume, but I don’t know how successful that would be.

    If you’re worried you might be an actual target for the local government’s law enforcement or intelligence agencies, then you’re more or less screwed.


Leave a Comment