Conversation
Notices
-
Embed this notice
Command, we have located the piss drawer
-
Embed this notice
> encrypted drives with junk data written to the drive before partitions created.
> create secondary partition that loads on bad or different password, so they think they're in when they force you to enter the password. Also use pam to wipe the real partition, so it doesn't show on the block. 😏
-
Embed this notice
I believe you can use Pam to run a script based on a separate authentication. The problem is the authorities would know the partition was smaller than the physical drive.
The junk data would obfuscate the location of the partition, but you'd still want it wiped if the situation was dire enough. I believe luks has a wipe command.
-
Embed this notice
@Humpleupagus @IAMAL_PHARIUS Can one make LUKS boot to a separate partition on a certain key? Or would it be more like a fail-through if the actual encryption password fails? 🤔