Message from @Deleted User

Discord ID: 543076816051503104


2019-02-07 12:17:36 UTC  

Itoddlers BTFO

2019-02-07 12:41:42 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/543048714147725322/AMD_Radeon_VII_przetestowany.png

2019-02-07 12:41:46 UTC  

based polish people

2019-02-07 12:41:59 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/543048783530033163/AMD_Radeon_VII_przetestowany.png

2019-02-07 12:42:13 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/543048841390456844/AMD_Radeon_VII_przetestowany.png

2019-02-07 12:42:50 UTC  

but apparently thats pretty much copy and paste from AMDs own benchmarks

2019-02-07 12:44:21 UTC  

so realworld tests still keep us waiting

2019-02-07 13:03:06 UTC  

Link to article?

2019-02-07 14:14:23 UTC  

Is it possible to determine, when a LUKS encrypted system has been successfully decrypted and booted the last time, if you are unable to decrypt it yourself?

The question in essence is: if you have two encrypted Linux systems installed on two SSDs and you are asked to hand over the decryption keys by the authorities, can you give the password of one of them to the authorities, and plausibly deny to remember the other one because "its an old system that I haven't used in a long time"?

2019-02-07 14:20:52 UTC  

as long as all log files are within encrypted container.. i doubt ?

2019-02-07 14:24:22 UTC  

mm actualy probly depens on system

2019-02-07 14:25:29 UTC  

if Grub2/uefi/whateverbootmanager is a snitch and keeps logs

2019-02-07 14:25:32 UTC  

then yes @Deleted User

2019-02-07 14:26:24 UTC  

but boot managereless login ??should not ?? write logs to anywhere but inside the containers once you have given password

2019-02-07 14:28:10 UTC  

but if you need such deniability, you better of using something else than luks

2019-02-07 14:31:26 UTC  

such scenarios are when the "destroy on password2" bundled with "destroy if copied" step in

2019-02-07 14:32:02 UTC  

later needing quite bit tinkering with the controller board of hdd

2019-02-07 14:32:50 UTC  

this is why you never store anything of negative value on your computers

2019-02-07 14:33:06 UTC  

I am not storing anything that incriminating but wouldn't that be even less plausible to deny?

2019-02-07 14:33:22 UTC  

They can inspect the broken hard drive and figure out

2019-02-07 14:33:37 UTC  

yes but they would not have any proof

2019-02-07 14:33:54 UTC  

only that you had such setup there

2019-02-07 14:34:15 UTC  

And that you deliberately gave password 2 which hindered investigations

2019-02-07 14:34:26 UTC  

Which would bring you right into even more trouble

2019-02-07 14:34:51 UTC  

not really no

2019-02-07 14:34:58 UTC  

you just make the password2 = password2

2019-02-07 14:35:06 UTC  

or 1234

2019-02-07 14:35:22 UTC  

or your wifes name

2019-02-07 14:35:35 UTC  

when they try to passguess they end up destroying it themself

2019-02-07 14:35:40 UTC  

you had nothing to do with it at that point

2019-02-07 14:38:37 UTC  

as always you have right to be silent

2019-02-07 14:38:44 UTC  

and you should use that right

2019-02-07 14:39:00 UTC  

also right to drink,wc,lawyer up fast as possible

2019-02-07 14:39:43 UTC  

you should know this by now :3

2019-02-07 14:40:10 UTC  

everything you say can be and WILL BE used AGAINST you.

2019-02-07 14:47:45 UTC  

I don't understand how that can be less incriminating than partially collaborating and saying that you forgot the old one because you never used it

2019-02-07 14:48:49 UTC  

cause if/when they do get inside

2019-02-07 14:48:51 UTC  

its clear you lied

2019-02-07 14:48:59 UTC  

and your punishment will be more severe

2019-02-07 14:50:28 UTC  

speaking can only make your situation worse