Manual on safe work with dead drop (part X) - translation by pale.cafe : vendor_handbook | Torhoo darknet markets
Hashing is more about reliability than preventing an attack on the storage.
On the next page we will need to choose how much space the storage will take up. My recommendation on this is simple - the smaller the better. Ideally, the size of the repository should not exceed the average file size of the folder you have chosen to store. Specify the size in kilobytes, no real file has a clear 50, 60 or 81 MB size.
And I strongly discourage making storage larger than 30 mb.
Files larger than this size will be checked with 99 percent probability, secondly, a 2 GB file will be like a red rag for a bull for a forensics specialist. As a consequence, an anal decryptor (aka soldering iron — translator note) will knock into your life.
You'll ask, how do I store a lot of files then. The answer is simple: use multiple storages.
As an example, one vault that you know the password for by heart stores a file with passwords from other vaults that already contain your files.
Now let's consider such a thing as PIM
PIM acts in this case as a 2-factor authentication, that is, without knowing PIM it will be impossible to open the storage. And even if you know that PIM is used, but do not know it, it will increase the time of decryption of the container.
Key file
I also recommend using this method when encrypting in combination with PIM, breaking the vault becomes an unrealistic task.
The key file can be any file on your computer or on any storage medium. Without knowing what kind of file it is, it is impossible to open the vault if the file is edited. It will also be impossible to open the vault using it. After the password, PIM and file are selected. It is necessary to choose the type of file system in which it will be mounted. here you can leave FAT, or the system in which your container will be opened.
Finally, the process of creating the storage begins. In the course of which it is necessary to move the mouse inside the window, the more actively you do it, the better.
As soon as the loading bar fills up, click “Format” and we will see a message that the storage has been successfully mounted. After that we will be offered to create a new storage, if necessary, we create it, if not, we click exit.
Now let's open our first storage.
- To do this, on the main page click “Select File”, select our file and click “Mount”;
- After that we see a window with PIM password input, specify it if you have it;
- Specify the key-file: click on keyfiles and select the desired file:
- Click OK and wait for our repository to mount.
Once the vault is mounted, you will be able to see it on your desktop. After you have used the vault, click “Dismount” on the main page of the application and the vault will be encrypted again. If you use several storages, press the "Dismount all" button.
Hidden storage
In the last article we looked at the process of creating a regular encrypted crypto vault. Now we're going to look at how to make it so if your vault does get found, and you're put to the test with a thermorectal cryptodecrypto. Let's look at the second bottom. Proving that a vault has a second bottom is virtually impossible, except for a number of things.
Editing the container
With the help of special programs, you can see when the container was last opened. And the last time the files it contains were edited.
Example:
The container was opened today, but the files that are in the storage you gave the key to were edited six months ago. Therefore, this situation will raise suspicions that a second bottom is present and the thermorectal decryption will continue.
Solution:
Open your fake vault more often and edit and open files from it, this procedure does not take so much time, but the vault does not look so suspicious and can be considered real.
It is very easy to get caught on the fact that in the storage, from which you gave info there is all sorts of slag in the form of photos, videos and music. Those who will analyze the data, and even the most obtuse cop will realize that it's a fuck-up. And the search for the truth will continue, just like your torture.
Solution: put valuable information into this container, but not too much: logins and passwords from social networks, data on empty cryptocurrency wallets.
It is not necessary to make the size of the second bottom all 65% of the maximum size of the storage. The smaller the better. This will reduce the chances of the vault being detected. You don't need to make the password too simple, make it complex and use PIM for plausibility. A password that is too simple will raise more suspicions than you might think. In the hidden volume besides the PIM using a key file.
Don't give away the password to the fake vault right away. Get nervous, endure a few bumps, let those trying to gain access start spewing threats. Pretend it scares you. And hand over the key to the fake vault. If you give it up right away, that's the same as you saying you had it.
Now that we've talked about the things you should pay attention to when creating a hidden volume, let's get down to creating it.
Creating hidden storage
1. Select "Create an encrypted file contalner" and click "next";
2. Select "Hidden VeraCrypt volume" and click "next";
3. Select the location and name of the file and click "next";
4. Select the encryption type and encryption algorithm of our fake vault and click "next";
5. Choose the storage size and click next;
Remember that the smaller the storage size, the better, and specify the storage size in kilobytes.
6. Enter your password, and PIM, which I strongly recommend you do for plausibility;
7. Enter the PIM and click next;
8. Choose the file system format and click next;
The process of encryption of our fake volume has started, for this purpose actively drive the mouse in the window of storage creation, as soon as the bar reaches the end, click on the "Format" button.
9. The fake storage is ready, click next to start creating hidden volume;
10. Click "next";
11. Choose the type of encryption, you can choose a completely different type of encryption;
You need to choose the size of the hidden storage. Make it as small as possible, and store really important information there.
12. Enter the password, I also recommend to use a key file in conjunction with PIM with the hidden volume;
13. Choose a file system, you can also specify it only under the system on which this storage will be opened;
14. Repeat the process of encryption of our hidden volume, for this purpose actively drive the mouse in the window of storage creation, until the process is over and you need to click the “Format” button.
Done, the hidden vault is storage.
Now when you select an encrypted file, you can enter your hidden vault by entering the password, PIM and file key. Or you can open your fake vault by entering the password and PIM from it.
Recommendations for cashing out