Comment by ajsnigrutin
Comment by ajsnigrutin a day ago
And you must then give the password to your data.
https://thblegal.com/news/can-i-be-prosecuted-for-failing-to...
https://www.ilfattoquotidiano.it/in-edicola/articoli/2025/01...
etc.
Comment by ajsnigrutin a day ago
And you must then give the password to your data.
https://thblegal.com/news/can-i-be-prosecuted-for-failing-to...
https://www.ilfattoquotidiano.it/in-edicola/articoli/2025/01...
etc.
This seems like a job for a truecrypt style system. Either you do it at a file-level, or you have it split into (say) 10MB file chunks, and if you want to access a certain file you have an encrypted local db that acts as a magic decoder ring ("file test.csv is spread across CLOUD1.DB CLOUD3443.DB CLOUD132.DB").
Combine that with steganography (Enter real_password, and test.csv is a list of bank accounts, enter fake_password, and test.csv is a list of apple store locations, enter random_password, and it decodes junk). Maybe combine that with multiple layers of passwords (one ring to rule them all, except certain files).
Obviously, you'd want to steganographize the decoder ring as well.
In the extremely unlikely event that I'm compelled to by a judge, yes. Or if someone chooses to beat me with five dollar wrench, of course. And even then A) it can't happen without my knowledge and B) I have the option of refusing and bearing the consequences.
I didn't say it solves every problem, just that it's the only way to have proper end-to-end encryption.