Hacker News new | past | comments | ask | show | jobs | submit login
HiddenVM – Use any desktop OS without leaving a trace (github.com/aforensics)
170 points by paravirtualized 10 months ago | hide | past | favorite | 39 comments



I’m not following what this gives you that Veracrypt's inbuilt hidden+decoy OS feature doesn't already? It seems they require you to manually set up a veracrypt hidden partition for anything to be "hidden" anyway. How is booting your encrypted partition in a VM within Tails more secure than booting it directly?


> How is booting your encrypted partition in a VM within Tails more secure than booting it directly?

There will be no proof of an operating system existing at all, just random data. If you use VeraCrypt along with a hidden partition normally, you would still have the VeraCrypt bootloader or an apparent Windows installation on the drive.


After truecrypt 7.1a (I think), the canary vanished. After that, didn’t it become veracrypt? Did they ever add a canary or has there been research in showing it’s not backdoored?


While it’s never been officially proven, there is a interesting story behind truecrypt. It was allegedly written by one guy (Paul Le Rou) who was a programmer turned cartel boss/gun/drug runner.

But back to your question, truecrypt was professionally audited and deemed “secure”, some issues were found but none that were back doors or significant. Shortly after(might have even been during) the audit truecrypt deleted all old versions and posted a weird message telling people to use bitlocker.

After some time veracrypt picked up the torch and has continued developing what was truecrypt.


Wow .. what a crazy story

https://en.wikipedia.org/wiki/Paul_Le_Roux

This guy's life definitely needs a movie


I think it said there’s a 447 page book and a few articles. This plus a little probable fiction could be a long tv series.

The possibility of being Satoshi of bitcoin also. Entertaining read. Programmer -> cartel boss.


Nice one. I’ve been using Veracrypt for many years now, after the whole Truecrypt fiasco. Just one friendly advice… always have a decoy partition or decoy OS, otherwise it seems very suspicious to have a disk filled with random data ;-)


I am less convinced. If the GMan nabs you, sees you are using a tool which heavily advertises a hidden partition, and coincidentally your drive has a large unused block of random data - they are unlikely to be fooled.


If your security concerns are about governmental intrusions, then you have a security need that no single tool can resolve anyway. You need to address overall behavior and habits, which are likely to include things like not keeping sensitive data on machines that can be easily accessed regardless of the use of encryption or obfuscation.


> otherwise it seems very suspicious to have a disk filled with random data ;-)

You could always argue that the drive was previously "securely erased" and filled w/ random data and/or that it was "securely encrypted" with a key that was then destroyed?


There was an interesting talk at one edition of CCC that boiled down to saying those techniques work only if you have the right to remain silent. Which depends on the country you're in. And I heard that in the USA, even though you have the right to remain silent, they still have the right to put you in jail if you refuse to give out your key.


You're thinking the RIP Act in the UK where the police can get an order from a judge for you to turn over a key/passphrase and you need to either prove you don't know it or face up to two years in jail (five for cases of child abuse or national security).

I'm not American but I'm pretty sure no law like that in the US would be upheld at appeal, it's pretty directly conflicting with the 5th amendment.


I heard it specifically for the USA in at least two occasions. I don't remeber the first, but the latter was in the Brett Jonson's show: in an episode, he talked about another criminal that had some encrypted material and refused to give out the key. He was put in jail until he decided to give it, and at that point IIRC he got an even longer sentence due to the proof he gave them access to. But now that I think about it, it could be that the USA had him arrested by a third country, so maybe some other state's law was at stake. But I would still not bet my safety on it. Even if you successfully appeal it, you would still risk to spend quite some time in prison.

I'm not a lawyer, but from what I remember in the USA the 5th amendment defense works only with some kinds of keys: it works with a password, but wouldn't work with a "pattern" (i.e. Android's option of drawing a pattern by connecting dots) or biometric authentication.


I remember a case too. They were 100% certain a hard drive contained CSAM but could not get the password. I'm pretty sure he was jailed for contempt until it was given out. Definitely inside the USA.

This might be it, I might be misremember the finer details:

https://www.bbc.com/news/technology-36159146


I remember a case too. They were 100% certain a hard drive contained CP but could not get the password. I'm pretty sure he was jailed for contempt until it was given out. Definitely inside the USA.


"prove you don't know"

It might be my lack of coffee, but how would that work? You can prove you know something, but how would you prove you don't?


They could still try rubber-hose interrogation techniques until you remember the key...


Does full disk encryption not look like random data?


Basically yes. But as I understand it this is the reason why some border guard might ask you to boot up your machine to show him your system as a used and "lived in" installation. You might want to avoid arousing suspicion by lugging around a piece of dead metal (a laptop with unusable bit noise on its discs) or by presenting a fresh and empty OS.


You might also want to have a look at https://shufflecake.net/

The current state is far from usable, but the final goal would be to have multiple nested "hidden OSes" that can be booted and managed concurrently, depending on the provided password.


You can get microsd cards and even nanosd card that are so small that hiding somewhere on your person is easy.

Encrypt everything you need on it.

They are, should it be required, easy to quickly and discreetly swallow as a last resort. (To get rid of it. I have no idea what would happen to a nano sd card travelling through your body, but I presume that it, or at least the ability to read the data on it, would be destroyed.

Then carry a regular laptop with you, with all the regular applications and regular behavior of them. Boring.

Using tails as the main operating system on a computer you fear might be inspected by customs or secret agents is screaming:

"I have something to hide and you cant find it"


A big Show HN thread from four years ago:

https://news.ycombinator.com/item?id=22492343


Why is there so much “branding” to Tails?

I feel like all of tails could simply be a short bash script that uses “debootstrap” to stage a Debian installation and then make it into a squashfs image that is mounted with overlayFS and a tmpfs (which is like a 3-line addition to the main “init” script).

(And yes, I’ve done this before. It’s not hard)

Instead they have a very fancy website and provide binary images without really showing how it works…

Not trying to belittle what they did, I’m sure that took a lot of work.

Just don’t understand the current fads… I feel like they’re trying a little too hard to sell a free product…


Tails provides a live ISO that guarantees that everything you do goes through Tor. It seems like a useful thing to have preconfigured. Privacy shouldn't require extensive Linux experience. And even then, I've been using Linux for decades and, whilst I could probably figure it out, I wouldn't trust myself that my setup isn't leaking packets.

Besides, all distributions do some branding (some to the point of obnoxiousness).

HiddenVM, on the other hand, I don't really understand. They make you go through tons of manual steps to achieve the aforementioned hiddenness... Might as well DIY. And their README reads like a VC pitch. "HiddenVM is an innovation in computing privacy." really? You're taking tails and telling the user to install virtualbox, veracrypt, and do the setup...


> complicated apt-get update wizardry that achieves our VirtualBox-installing breakthrough.

yikes.


  A CRYPTO NERD'S IMAGINATION:

  HIS LAPTOP'S ENCRYPTED.
  LET'S BUILD A MILLION-DOLLAR CLUSTER TO CRACK IT.

  NO GOOD! IT'S 4096-BIT RSA!

  BLAST! OUR EVIL PLAN IS FOILED!"
----

  WHAT WOULD ACTUALLY HAPPEN:

  HIS LAPTOP'S ENCRYPTED.
  DRUG HIM AND HIT HIM WITH THIS $5 WRENCH UNTIL HE TELLS US THE PASSWORD.
Note1: xkcd/538

Note2: I'm missing images on hacker news. I understand why they are absent here though


Full link for that like to click :-)

https://xkcd.com/538/


"The laptop probably has a HiddenVM. Drug and hit the person with this 5$ wrench until we get access."

https://xkcd.com/538/


See also: https://github.com/IncognitoIceman/HiddenVM

Unfortunately, it looks like this version is no longer maintained.

"HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whonix with the unbreakable strength of Veracrypt."


Can you elaborate on why to see it, also, since they look like forks of the same project?


I think that the focus of combining it with Whonix is interesting and is what piqued my interest originally. Other than that, nothing.


this is quite secure but not against thermorectal cryptoanalysis though



> Imagine you're entering a country at the airport. The border agents seize your laptop and force you to unlock it

If this concerned me I would just wipe the drive and/or factory reset the device before travelling, and restore it later, rather than try to experimentally figure out what games I can and can't play with the customs authorities.


This is the approach that people I trust recommend. Some go further: not only should you not take sensitive data across borders physically, you shouldn't rely on your devices (or undeveloped film, for that matter) not getting wiped at the airport.


FWIW, I have a colleague who worked at an office collaboration software firm that applied a "no company tech into China" to everyone.


I'd be more concerned about what they could plant on my machine versus what they find on it.


Why allow them to take a device you think is secure and separate it from you then still consider it so.


says the man that has nothing to hide, except his lack of trust :-D




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: