Feature Request: Peace of mind when crossing borders

A post was split to a new topic: Dual Boot with different drives

I doubt that you have a working implementation with Veracrypt that
provides PD of qubes in hidden volumes. (I may have missed where you
posted details of your approach.)
It’s somewhat difficult to hide the existence of a hidden volume - you
seem to suggest that a solution is to provide a hidden volume by
default.
The result will be that an adversary will start from the position that
the volume exists, and is in use.
Almost all Qubes users will be using SSDs, or USBs - either is likely to
be using trim and wear levelling, and that in itself will impact PD. I
don’t know if you have considered this, or if you have taken steps to
mitigate that risk. If you have I would be interested in the details.

I never presume to speak for the Qubes team.
When I comment in the Forum or in the mailing lists I speak for myself.
2 Likes

In another post I already proposed a solution (there), but you never gave your opinion.

Can you elaborate please ? I’m no SSD expert. Isn’t the internal SSD firmware hiding “old data” from us ?
Also, wouldn’t OPAL drives mitigate that risk, when the hidden partition is mounted ? Again, I’m no OPAL expert, I still have to try this so I’m only “thinking out loud”.

Unman, are you suggesting, that even if slower, a spinning drive would be more secure? if someone could take apart computer?

1 Like

No, rotating disks are even harder to secure.
Some security researchers have found that even after many erasures/rewrites, original data can be read.
That’s why it’s often said to hammer or drill your rotating disks before throwing them away.
Also, the physical media can be seen as “mechanical” storage : think about old vinyl disks (scratch), or even a tag in a tree, or a mark in a rock.
AFAIK, flash chips can’t be read “from outside” an OS (with microscope or other means).
And AFAIK again, the embedded/internal SSD firmware encrypts data on the chips (well, should).
So extracting NAND chips to put them in another SSD is not supposed to work.

As I posted for the topic opsec
watch old spy movies / training films and adapt the teachings to modern times.

Opsec: watch old spy movies / training films and adapt the teachings to modern times.

my favorite
#1 Undercover (Ca 1940’s) - YouTube

For this topic: The film quotes like that: “dont bring your equipment with you when you enter enemy country, the office will send it later to you when you established good cover”

So to cross the border to enemy country you just carry a laptop with windows, some application software, libreoffice, tons of science papers of a field you have some knowledge of.

Qubes gets installed later using an usb stick or tftp from your favorite openwrt-hotel router, or you have an ssd hidden somewhere else - not in your shoe!

Other good teaching : check for the labels in your clothing
→ use the right keyboard on your laptop (a hebrew keyboard in an arab country could cause serious trouble).

Just get the right sense of awareness and think for yourself. Many things are universal.

It would be great to have an under cover mode like you find in new kali.org.

What about copy cat-ing this for qubes dom0?
The under cover mode was lots of work, I am sure, but beeing open source qubes could take it and adapt it.

Under cover just radiates “nothing to see here” if bystanders see the screen.
But this is enough to convince a more or less stupid security officer (he would not be a security officer if he was sharp minded) who wants you to present your running laptop as “batteries could be bombs” or for some other stupid protocol he needs to follow.

Also under cover mode is a funny to joke to present to people who dont know kali.

cheers

1 Like

Look at this, it is cool, the file manager of the window manager looks and feels 80% of windows explorer and more funny changes.

It is not just a wallpaper

To quore my favorite spy training film: “Blown cover!” :wink:

Look at the picture

“Debian users” at the start menue…

Booom blown cover :wink:

It should really look like the windows system.
Rename applications and icons.

One should compare tails camouflage with kali under cover.

I would tend to use kali under cover as this is actively maintained and qubes could just fork the modifications for the window manager (gnome based iirc) used.
Developing and maintaining an under cover mode is much work so why wasting energy here when you can just port the modifications and improvements kali does to their under cover mode to a qubes fork of the kali under cover mode.
The qubes project is understaffed and additional tasks worsen the situation.

The cover should be good, also ctrl, alt back space should be there with a task manager showing some fake renamed Tasks :slight_smile:
So I would suggest to use kali.org under cover.

You need kali also to clean up the smoking debris of your crashed qubes-os, so get used to kali in times of peace as you need it in times of war :slight_smile:

Rubber hose fs had a file called beatings to explain this issue, which can be solved by having layers to reveal while the existence if additional layers could be hidden sucessfully.
So after they got your cat pics present the password for your cat porn :slight_smile:

This is something, but it is greatly insufficient. It only passes the absolute most basic eye test. It does very little to address the true value of an integrated plausible deniability system with Qubes.

It’s worth bring up for sure, but falls far short of what I think is needed.

Definitely Qubes devs should not be working on an undercover GUI mode, as that is a band-aid solution.

If you have an invisible partition that can’t be detected by adversaries, you would get tortured regardless of whether you had one or not, so why not have one? At least then you can give up a password to make the torture stop.

I tried and I give up.

For sure but the process if “getting cought” starts with the basic eye.
Nobody spots you on the street and starts to toture you. It starts with the basic eye.
In my favorite spy training film, the spy was arrested for carrying a hand gun which has been found at a routine search at a train station. A good spy does not need a gun, as nobody notices him as being somehow special, and here comes the basic eye…

You can not always do the stunt of “letting your office ship your material using a safe house or a dead drop”. = you freshly install qubes and download your data VMs somehow.

So if you are operating in $enemy country you just need that amount of basic cover when someone passes by when you work in the library on your “thesis”.

While traveling I often use libraries to have a quiet space with a desk, internet and electricity.

Are you a spy then? Or journalist?

I am a scientist, doing a phd on computer science.
here I am looking for a very lean solution for containerization and virtualization using linux.

1 Like

Although spy tradecraft can apply to OPSEC as it relates to Qubes, this isn’t about creating something for spies. There are many things that people who aren’t already anonymous & just relying on not being detected need.

Journalists in oppressive countries are known as journalists to authorities (often), and the same is true for journalists entering oppressive countries from permissive ones.

In those cases, you are dealing with a specific analysis with the suspicion that you are doing no good, and measures need to be in place to dig you out of a hole you are in from step 1.

Qubes isn’t Kali, and although yes this Kali undercover is interesting, that only helps with Kali, not all the Qubes we use, and again only passes the most unscrutinous level of inspection.

I agree that the camouflage is of OPSEC value, but it’s not really valuable for border crossings.

1 Like

Having a kali like undercover dom0 would be enough.

I use X11 only to have space for my terminal windows :slight_smile:

You can just shut down or close your guest VMs windows. Also a “hidden” desktop would help, so you can do a context switch and show boring papwrs if someobe is too nosy.

Sorry, but all I’m seeing is that you are entering enemy countries’ libraries and not looking for, but constantly offering.

Again this is off-topic. This is about border inspections.

1 Like