netrin
Sr. Member
Offline
Activity: 322
Merit: 251
FirstBits: 168Bc
|
|
July 28, 2011, 12:51:27 PM |
|
Wipe your phone, laptop, and any electronic device or storage medium (including USB keys) so if they ask to have a look you can comply, but they won't get anything. Store your stuff in the cloud encrypted and get it after you arrive.
That's an excellent idea. I was planning to ensure that everything was encrypted on the disks, but yours is a much more elegant solution. Thank you. Don't mention bitcoins.
Did that get you IN TO the room? Or just make matters worse/more confusing? In 2004 I was carrying a childrens' book (it was small, hard covered and convenient for carrying tickets) whose title translates to " The mole who wanted to know who shat on his head". A passenger in the next line noticed and commented on it. We had a friendly conversation. Minutes later, the passport agent became very suspicious as if I were holding bomb manuals. I was initially in light spirits but quickly saw this situation was going too far. I wasn't pulled to a back room, but I was questioned heavily. I'm not surprised that the English/American version of the book has such a flaccid title:
|
|
|
|
Nefario
|
|
July 28, 2011, 01:01:57 PM |
|
Wipe your phone, laptop, and any electronic device or storage medium (including USB keys) so if they ask to have a look you can comply, but they won't get anything. Store your stuff in the cloud encrypted and get it after you arrive.
That's an excellent idea. I was planning to ensure that everything was encrypted on the disks, but yours is a much more elegant solution. Thank you. Don't mention bitcoins.
Did that get you IN TO the room? Or just make matters worse/more confusing? In 2004 I was carrying a childrens' book (it was small, hard covered and convenient for carrying tickets) whose title translates to " The mole who wanted to know who shat on his head". A passenger in the next line noticed and commented on it. We had a friendly conversation. Minutes later, the passport agent became very suspicious as if I were holding bomb manuals. I was initially in light spirits but quickly saw this situation was going too far. I wasn't pulled to a back room, but I was questioned heavily. I'm not surprised that the English/American version of the book has such a flaccid title: I must get that book for my SON! FOR SCIENCE! On the airport thing, I was flagged for having very little cash, talking about bitcoin made it worse.
|
PGP key id at pgp.mit.edu 0xA68F4B7C To get help and support for GLBSE please email support@glbse.com
|
|
|
fabianhjr
Sr. Member
Offline
Activity: 322
Merit: 250
Do The Evolution
|
|
July 28, 2011, 03:50:09 PM |
|
|
|
|
|
molecular
Donator
Legendary
Offline
Activity: 2772
Merit: 1019
|
|
July 28, 2011, 08:52:21 PM |
|
What would the customs do if my notebook had drive encrypted and I refuse to decrypt it?
Probably take it from you, never to be seen again. If they REALLY want whats on it then they might get a court order for your to decrypt it, and failing to do so would result in you being held in contempt of court and imprisoned until you give it to them. Now this is pretty much what has happened to one poor fellow and it's the first time it's gone this far AFAIK, so that case might set the precedent if it gets to the top courts of the land. http://www.reddit.com/r/Libertarian/comments/i8l6b/truecrypt_user_held_in_contempt_of_court_for_not/http://news.ycombinator.com/item?id=2693599But that's only if they REALLY want it. If you have data they might REALLY want, you could use deniable encryption, e.g like this: One example of deniable encryption is a cryptographic filesystem that employs a concept of abstract "layers", where each layer would be decrypted with a different encryption key. Additionally, special "chaff layers" are filled with random data in order to have plausible deniability of the existence of real layers and their encryption keys. The user will store decoy files on one or more layers while denying the existence of others, claiming that the rest of space is taken up by chaff layers.
|
PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0 3F39 FC49 2362 F9B7 0769
|
|
|
netrin
Sr. Member
Offline
Activity: 322
Merit: 251
FirstBits: 168Bc
|
|
July 28, 2011, 09:17:25 PM Last edit: July 28, 2011, 09:43:22 PM by netrin |
|
One example of deniable encryption is a cryptographic filesystem that employs a concept of abstract "layers", where each layer would be decrypted with a different encryption key. Additionally, special "chaff layers" are filled with random data in order to have plausible deniability of the existence of real layers and their encryption keys. The user will store decoy files on one or more layers while denying the existence of others, claiming that the rest of space is taken up by chaff layers.
If I allocate 10 MB to an encrypted file/partition, then fill one layer with 5 MB with sensitive data, what keeps me from accidentally overwriting the sensitive layer with a second layer of porn? Does one layer know the inodes of the other, while the second layer does not?
|
|
|
|
Chris Acheson
|
|
July 28, 2011, 10:00:44 PM |
|
If I allocate 10 MB to an encrypted file/partition, then fill one layer with 5 MB with sensitive data, what keeps me from accidentally overwriting the sensitive layer with a second layer of porn? Does one layer know the inodes of the other, while the second layer does not?
For normal usage, you enter the passphrases for both the visible and hidden layers, so that the system knows not to overwrite the hidden layer. When the visible layer is accessed without providing a passphrase for the hidden layer, there is a danger of overwriting it.
|
|
|
|
MoonShadow
Legendary
Offline
Activity: 1708
Merit: 1010
|
|
July 28, 2011, 11:46:50 PM |
|
|
"The powers of financial capitalism had another far-reaching aim, nothing less than to create a world system of financial control in private hands able to dominate the political system of each country and the economy of the world as a whole. This system was to be controlled in a feudalist fashion by the central banks of the world acting in concert, by secret agreements arrived at in frequent meetings and conferences. The apex of the systems was to be the Bank for International Settlements in Basel, Switzerland, a private bank owned and controlled by the world's central banks which were themselves private corporations. Each central bank...sought to dominate its government by its ability to control Treasury loans, to manipulate foreign exchanges, to influence the level of economic activity in the country, and to influence cooperative politicians by subsequent economic rewards in the business world."
- Carroll Quigley, CFR member, mentor to Bill Clinton, from 'Tragedy And Hope'
|
|
|
riceberry
|
|
July 29, 2011, 06:34:23 AM |
|
nice article +1
|
|
|
|
julz
Legendary
Offline
Activity: 1092
Merit: 1001
|
|
July 29, 2011, 08:15:00 AM |
|
Recently I've noticed a few Chinese articles popping up in my searches for bitcoin articles. I've used google translate to check out some of them.. so far they've been fairly short and basic rehashes of other news. Here's one which seems a little more in depth - describing how to mine them and comparing them to the Chinese virtual currency 'Q coin' (a centralized system run by Tencent QQ) As you can see from the title - google translate does a sterling job of translating Chinese into... 'Chinglish'.. but that's to be expected I guess! I've no idea how much press bitcoin is getting in the Chinese language media overall and whether it's generally positive/negative - perhaps someone who can actually read Chinese can clue us in.
|
@electricwings BM-GtyD5exuDJ2kvEbr41XchkC8x9hPxdFd
|
|
|
julz
Legendary
Offline
Activity: 1092
Merit: 1001
|
|
July 29, 2011, 10:16:24 AM |
|
|
@electricwings BM-GtyD5exuDJ2kvEbr41XchkC8x9hPxdFd
|
|
|
julz
Legendary
Offline
Activity: 1092
Merit: 1001
|
|
July 29, 2011, 10:18:46 AM |
|
|
@electricwings BM-GtyD5exuDJ2kvEbr41XchkC8x9hPxdFd
|
|
|
julz
Legendary
Offline
Activity: 1092
Merit: 1001
|
|
July 30, 2011, 02:23:45 AM |
|
Why the bitcoin is no substitute for credit cards http://blog.instabill.com/index.php/2011/07/29/bitcoin-no-substitute-for-credit-cards( Instabill pimping themselves over bitcoin by pushing some tired old misinformation regarding the mtgox flash crash, as well as this FUD gem: "Because bitcoins are computer-generated, it is possible to create counterfeit coins." )
|
@electricwings BM-GtyD5exuDJ2kvEbr41XchkC8x9hPxdFd
|
|
|
julz
Legendary
Offline
Activity: 1092
Merit: 1001
|
|
July 30, 2011, 02:27:52 AM |
|
This is a pretty nice bitcoin intro.
|
@electricwings BM-GtyD5exuDJ2kvEbr41XchkC8x9hPxdFd
|
|
|
|
fabianhjr
Sr. Member
Offline
Activity: 322
Merit: 250
Do The Evolution
|
|
July 30, 2011, 02:48:31 PM |
|
|
|
|
|
philipp
Newbie
Offline
Activity: 30
Merit: 0
|
|
July 30, 2011, 08:24:41 PM |
|
There was an article on Bitcoin in c't, a bi-weekly German computer magazine (sold curculation about 350K) today. At 6 A4 pages it was a rather in-depth article, and I did not notice any factual errors.
Philipp
|
|
|
|
Dusty
|
|
July 30, 2011, 10:15:53 PM |
|
A mozilla developer, Brian Warner, does a technical introduction of bitcoin. Video and slides.
|
|
|
|
Schleicher
|
|
July 31, 2011, 01:22:03 AM |
|
There was an article on Bitcoin in c't, a bi-weekly German computer magazine (sold curculation about 350K) today. At 6 A4 pages it was a rather in-depth article, and I did not notice any factual errors.
Link: http://www.heise.de/ct/inhalt/2011/17/74/
|
|
|
|
giszmo
Legendary
Offline
Activity: 1862
Merit: 1114
WalletScrutiny.com
|
|
July 31, 2011, 01:35:26 AM |
|
In BitCoin there is no encryption involved. Only signatures. It may be the same field of research but there are no secrets transmitted in the blockchain so most likely those censorship laws don't apply to bitcoin.
|
ɃɃWalletScrutiny.com | Is your wallet secure?(Methodology) WalletScrutiny checks if wallet builds are reproducible, a precondition for code audits to be of value. | ɃɃ |
|
|
|
molecular
Donator
Legendary
Offline
Activity: 2772
Merit: 1019
|
|
July 31, 2011, 10:36:49 AM |
|
There was an article on Bitcoin in c't, a bi-weekly German computer magazine (sold curculation about 350K) today. At 6 A4 pages it was a rather in-depth article, and I did not notice any factual errors.
Link: http://www.heise.de/ct/inhalt/2011/17/74/wow, awesome! This'll hit a lot of techies in germany. C't is quite respectable and well-read.
|
PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0 3F39 FC49 2362 F9B7 0769
|
|
|
|