I don't have anything FBI-raid-worthy in my home.
If they raid it, they'll find nothing but a hefty lawsuit lodged firmly up their asses.
Name:
Anonymous2012-10-30 1:33
Fuck that, I'll leave in a body bag before I leave in cuffs.
Name:
Anonymous2012-10-30 1:36
I don't but I have my battlestation set up next to a small garbage compactor. If it goes down, I'll leave those fuckers with a 3 inch cube and nothing else.
>>15
They already have everything, so you have nothing to worry about.
Name:
Anonymous2012-10-30 4:10
>>15
Everything in truecrypt. Then install a VM with non-persistent storage to pirate and download CP in. Save your copies of usblines.mkv and GayNiggersFromOuerSpace.avi to a microSD card (encrypted), and swallow it when they come for you.
>>19
Truecrypt isn't free but the source code is available for audit. This free alternative may be good, I don't know as I haven't actually used it. http://www.arg0.net/encfs
Name:
Anonymous2012-10-30 12:04
>>21
Suck the shit out of my greasy asshole, faggot, I'll do why the fuck
I like.
Name:
Anonymous2012-10-30 12:20
>>1
If FBI rides your home, you're fucked up anyway. Even if they fail to find any evidence, they will forge it.
I have a fake account named after my real name as it is written in my current state-issued d0x, and my primary account looks inconspicuous and is named in a daemon-like manner and has the home directory somewhere in /var. The fake account looks perfectly normal, with a Gnome xsession, a desktop littered with products of daily usage, a terminal window popping up after login etc etc, but .bashrc on that account double-shred -n2's sensitive data, after which it proceeds to DFE from my primary account. It also replaces itself with a normal .bashrc. It syncs file systems after each call to shred so that my software RAID can apply changes to the platters.
I hope that one day when I will be held at gunpoint I will log into that account on my computer and manage to destroy all evidence of whatever activities the investigators are upset with.
I also have an FUSE file system of my own design encrypted with a 4096 bit key. It is modeled after EncFS, but keeps data in the unused swap partition. IV is stored with other sensitive data, and once it is destroyed, it is impossible to recover anything it.
>>26
If you're using it to hide a bunch of CP, I don't have respect for you. But you're probably doing cool stuff like developing free software that's covered by patents or dumb laws and you don't want to get sued for IP infringement. So one idea would be to use steganography to hide your development stuff (which should be a few dozen megabytes total at most) inside an innocuous-looking file, e.g. a large uncompressed video or audio file.
Also, like >>27 said, you shouldn't rely on your script running before a full snapshot of your hard disk is taken. Use steganography.
>>29
Also, if you don't use steganography, you may end up in a situation where not disclosing your key means contempt of court and lands your ass in jail.
>>34
civil liberties erode when technology is mixed in. It varies country to country but it isn't uncommon to face jail time for refusing to provide a key for an encrypted disk.