Author

Topic: Key disclosure (Read 920 times)

hero member
Activity: 826
Merit: 501
in defi we trust
December 03, 2013, 01:28:31 PM
#4
Try with insanity when in front of the judge.
You have enough material on this forum to convince thousands of them.
legendary
Activity: 1582
Merit: 1002
November 30, 2013, 12:35:21 AM
#3
Store wallet.dat on TrueCrypt hidden partition. Fill outer partition with some useless data like your personal photos for more plausibility.
legendary
Activity: 1400
Merit: 1013
November 29, 2013, 03:44:51 PM
#2
What can be done in regards to key disclosure? How can you refuse to give the government the decryption key or data and not face contempt charges?

My current approach is to write down an impossible to remember string of numbers with other sparse characters (a-zA-Z!@#$%^&* etc) randomly in between to make bruteforce impossible (big charset) and copying easy. This is not the password, only a salt which means if it's compromised nothing really happens in on by itself.
If I am compromised I have the means to destroy that piece of paper easily and completely making any recovery of that particular drive impossible.

But this precaution is useless if it won't be believed by the judge etc...


Any advice on how to create a legally proof way of not giving decrypted data?

Have close friends who live outside Canada.

Store your savings in multisig addresses for which your key is not sufficient to spend by itself.
newbie
Activity: 11
Merit: 0
November 29, 2013, 03:34:37 PM
#1
It doesn't necessarily relate to only bitcoins but it does partially.


Region: Canada

What can be done in regards to key disclosure? How can you refuse to give the government the decryption key or data and not face contempt charges?

My current approach is to write down an impossible to remember string of numbers with other sparse characters (a-zA-Z!@#$%^&* etc) randomly in between to make bruteforce impossible (big charset) and copying easy. This is not the password, only a salt which means if it's compromised nothing really happens in on by itself.
If I am compromised I have the means to destroy that piece of paper easily and completely making any recovery of that particular drive impossible.

But this precaution is useless if it won't be believed by the judge etc...


Any advice on how to create a legally proof way of not giving decrypted data?
Jump to: