this post was submitted on 22 May 2024
14 points (81.8% liked)
Monero
1673 readers
17 users here now
This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.
Wallets
Android (Cake Wallet) / (Monero.com)
iOS (Cake Wallet) / (Monero.com)
Instance tags for discoverability:
Monero, XMR, crypto, cryptocurrency
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
i like the intention, but simple encryption is not going to cut it, you need to be able to deny the existance of the encrypted volume: https://blog.nihilism.network/servers/encryption/index.html what you're looking for is plausible deniability. in short, hide your mnemonic seed into a veracrypt hidden volume
@nihilist @MoneroMaster
If you are forced to decrypt a veracrypt volume on your siezed computer, the very fact that you are using veracrypt is probably enough for law enforcement to presume the existence of a hidden volume.
You can deny it, sure, but it's definitely no longer plausible.
how is it no longer plausible ? pls let me know who managed to prove the existance of a hidden volume and how, as up until now i didnt find anyone that managed to. If there is no proof that the hidden volume exists, you can keep claiming that there is no hidden volume.
Hi Nihilist, I recently saw your Haveno demo on Monero Talk, good job! Thanks for contributing helpful resources to the community, we need more of this.
One thing I try to keep in mind is that if we get to a stage where governments are holding citizens in embassies without pressing charges for decades, arresting developers for "conspiracy" to commit crimes, etc. then plausible deniability is not really applicable anymore. Plausible deniability assumes courts are seeking justice instead of following orders.
I've recently been studying the GULAG system of the USSR and it's amazing how everyone knew that their mock trials were a show and that the vast majority of people in the forced labor camps were innocent. The good news is that these types of systems can never endure any significant longevity. Compare the length and legacy of the USSR to the Roman Empire and it's a laughable comparison.
That being said, your suggestion for a decoy is a good system to implement for added security indeed. Thanks for sharing Veracrypt, I was not aware of this particular encryption method. I'll need to compile a list of other encryption systems for people to investigate if they want something more complex/robust as I've received a lot of feedback about this.
It might also be worth considering creating a dummy seed that is kept in a safe, so if a thief was to break in and access it you would have misdirected them from your true seed hidden in another location.
yea thats the point of having a decoy volume, you claim that the hidden one doesnt exist and that you gave the password. it remains possible until the adversary is able to prove that the hidden volume exists.
@nihilist @MoneroMaster
If you are using veracrypt on a siezed computer, that fact is probably enough for law enforcement to presume the existence of a hidden volume.
You can deny it, sure, but it's no longer plausible.