• parpol@programming.dev
    link
    fedilink
    English
    arrow-up
    65
    arrow-down
    2
    ·
    6 months ago

    Truecrypt had a false volume for this very purpose.

    You have one password to unlock your drive, and one password to fake unlock your drive and instead unlock a volume that looks like your drive, where you store stuff that looks important but isn’t your real secret.

    • ✺roguetrick✺@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      arrow-down
      1
      ·
      6 months ago

      By physical here, they mean using your biometrics by force. They’re still not allowed to beat you with a rubber hose.

      A court, however, can force you to give up a password or hold you in contempt (which is essentially the rubber hose option). Having false unlocks defeats that

      • HelixDab2@lemm.ee
        link
        fedilink
        English
        arrow-up
        8
        ·
        6 months ago

        A court, however, can force you to give up a password or hold you in contempt (which is essentially the rubber hose option)

        That remains to be seen; I don’t think that there’s ever been a definitive ruling on this in the US. One real problem is that they would have to be able to prove that you knew the password, and that can be a real problem. I have an old Tails drive; it’s been years since I used it, and I have no idea what the password is anymore. Shit, I sometimes have a brain fart and can’t remember the passphrase for my password manager, and I use that a lot.