Post AjoJqzOKZ6JMoWUTFQ by ComradeGibbon@mastodon.social
 (DIR) More posts by ComradeGibbon@mastodon.social
 (DIR) Post #AjoGwa2HRxk4399QVk by foone@digipres.club
       2024-07-11T04:31:37Z
       
       0 likes, 0 repeats
       
       Am I misremembering, or was there some cryptographic system where you could set up a container and have two keys to it, each of which provided a different file with no way for anyone to prove the other file/key existed?ie, if the authorities forced you to decode it, you could give them the fake key and they'd only get the fake contents, and they couldn't prove that you have another key which reveals other contents?
       
 (DIR) Post #AjoH7HaEObqI0R8Oye by astrid@tiny.tilde.website
       2024-07-11T04:32:55Z
       
       0 likes, 0 repeats
       
       @foone truecrypt had secret volumes like that iirc
       
 (DIR) Post #AjoHCS30ux0JuN3uGe by jimbob@aus.social
       2024-07-11T04:33:01Z
       
       0 likes, 0 repeats
       
       @foone this is real, I remember it too. Have no idea how to find it.
       
 (DIR) Post #AjoHIxupLWVOTyL4b2 by Infoseepage@mastodon.social
       2024-07-11T04:34:17Z
       
       0 likes, 0 repeats
       
       @foone I think Truecrypt had a similar "hidden volume" feature.
       
 (DIR) Post #AjoHgW86Iyd5FvmHz6 by foone@digipres.club
       2024-07-11T04:35:53Z
       
       0 likes, 0 repeats
       
       @astrid thanks!
       
 (DIR) Post #AjoILD6ZwVXC7pTCOO by bigiain@aus.social
       2024-07-11T04:47:39Z
       
       0 likes, 0 repeats
       
       @foone TrueCrypt maybe? It had hidden file systems with plausible deniability (with some questions about how foolproof that was against analysts). It was discontinued a long time ago though…
       
 (DIR) Post #AjoJG0DOXY6SeajrM0 by foone@digipres.club
       2024-07-11T04:57:29Z
       
       0 likes, 0 repeats
       
       I was just wondering because I was thinking about the plausibility of shipping a video game with this technology, so that you could use deniable encryption to hide video game content.
       
 (DIR) Post #AjoJOs4YBRpS0QpYvY by foone@digipres.club
       2024-07-11T04:57:53Z
       
       0 likes, 0 repeats
       
       Even the NSA can't prove that there is or isn't a cow level
       
 (DIR) Post #AjoJXXDJ6auRv63ddA by whitequark@mastodon.social
       2024-07-11T05:00:18Z
       
       0 likes, 0 repeats
       
       @foone but you still need to give some people the key, right
       
 (DIR) Post #AjoJeaWDDSgoCHGPGi by foone@digipres.club
       2024-07-11T05:01:40Z
       
       0 likes, 0 repeats
       
       @whitequark I was figuring that you'd be able to do things in the game to generate the key. Like if you do one quest, a specific bit is 1 but 0 otherwise. So only by getting the game into the exact right state can you employ the second key
       
 (DIR) Post #AjoJlORsURy2n2Tu6K by dannotdaniel@mastodon.social
       2024-07-11T05:03:13Z
       
       0 likes, 0 repeats
       
       @foone well you can't spell DOOM without MOO 🐮
       
 (DIR) Post #AjoJqzOKZ6JMoWUTFQ by ComradeGibbon@mastodon.social
       2024-07-11T05:03:16Z
       
       0 likes, 0 repeats
       
       @foone Need a cryto system where the data is encoded in AI generated my little pony porn.
       
 (DIR) Post #AjoJx6bCgEnsuCQbQm by whitequark@mastodon.social
       2024-07-11T05:04:21Z
       
       0 likes, 0 repeats
       
       @foone oh, that's wildthat said... if you can see it often enough through casual play you can definitely brute-force it easily(this presumes that there is a checksum that tells you whether the secret level is decoded correctly or not. if there isn't it's equivalent to generative art, i think)
       
 (DIR) Post #AjoKF0pmqu0mErmvGi by gsuberland@chaos.social
       2024-07-11T05:06:34Z
       
       0 likes, 0 repeats
       
       @foone @whitequark I built a few crackmes that worked like this. similar idea to measured execution, except simpler and with much looser threat models.
       
 (DIR) Post #AjoO8EVM1kGEQVFmpk by SalusaSecondus@wandering.shop
       2024-07-11T05:52:12Z
       
       0 likes, 0 repeats
       
       @foone @whitequark If you know what you're doing then you can even do this with "normal" modes of encryption like AES-GCM. That super common mode isn't key- or message-committing, so you could create a single ciphertext which decrypts differently for different keys. Even less suspicious.
       
 (DIR) Post #AjoOLclh7wVFRXHYXI by fabian@mastodon.schle.nz
       2024-07-11T05:54:44Z
       
       0 likes, 0 repeats
       
       @foone In a game the size of the container would be suspicious. Why would your game include a 5 MB container you only extract 2 MB from?
       
 (DIR) Post #AjoOijAhUBNHxlzkK8 by nwp@mastodon.nzoss.nz
       2024-07-11T05:58:51Z
       
       0 likes, 0 repeats
       
       @foone IIRC Rubberhose came first... https://github.com/sporkexec/rubberhose
       
 (DIR) Post #AjoU7ZpxpNbu1Uxpqq by falken@qoto.org
       2024-07-11T06:59:25Z
       
       0 likes, 0 repeats
       
       @foone like Hot Coffee?
       
 (DIR) Post #AjoY6kOXUMWIIIzpFQ by aCrownOfMoths@mastodon.gamedev.place
       2024-07-11T07:44:24Z
       
       0 likes, 0 repeats
       
       @foone a few years ago I made a game that shipped on a very limited number of USB sticks. If you played it with the USB plugged in, it would play the actual game, if you copied the folder off and removed the USB it launched into a different B-side version of the game. I think adding encryption to something like that would genuinely be really cool
       
 (DIR) Post #AjrPGzrOWkYD2fBYPo by ppxl@social.tchncs.de
       2024-07-12T16:48:46Z
       
       0 likes, 0 repeats
       
       @foone ofc never gonna give you up.mp4