top | item 16134344

(no title)

cosban | 8 years ago

I've been working on an app/program that could be of use for this kind of situation. It's in way to early of a state to be released though. For the sake of giving it a name, we can call it Dead Man's Pass.

Effectively, for phones or laptops, you would have your standard password as well as a secondary password. If you use your fingerprint to open your phone, you would be able to register a different print as your secondary print.

Using your regular password/fingerprint would unlock the device normally. Using the secondary (dead man's pass) would either wipe the device, or open it to a honeypot state.

I think this would be useful for phones and perhaps laptops. If a memory card is confiscated, perhaps it could be encrypted with a program that follows the same concept. Either way, it allows people like DHS to demand a password, and have one given to them while also solving the problem of not wanting to show them private information.

discuss

order

cryptonector|8 years ago

Might as well just travel with wiped devices.

If you're a U.S. person the worst case scenario is they keep them anyways.

BUT! if you're NOT a U.S. person do keep in mind that CBP takes wiped devices (and lack of devices) as suspicious in itself, and may deny you entry.

cosban|8 years ago

Under this concern, perhaps the if being used in "honeypot" mode, it could act as a reverse vault. Rather than setting up what you don't want people to see, you would instead set what you do want them to see.

Regardless, implementation details would probably be better for a different topic.